Ebook: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings
- Tags: Coding and Information Theory, Data Encryption, Discrete Mathematics in Computer Science, Algorithm Analysis and Problem Complexity, Symbolic and Algebraic Manipulation, Algorithms
- Series: Lecture Notes in Computer Science 4851
- Year: 2007
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-17, held in Bangalore, India, in December 2007.
The 33 revised full papers presented together with eight invited papers were carefully reviewed and selected from 61 submissions. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.
This book constitutes the refereed proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-17, held in Bangalore, India, in December 2007.
The 33 revised full papers presented together with eight invited papers were carefully reviewed and selected from 61 submissions. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.
Content:
Front Matter....Pages -
List Decoding and Pseudorandom Constructions....Pages 1-6
A Survey of Recent Attacks on the Filter Generator....Pages 7-17
Iterative List Decoding of LDPC Codes....Pages 18-19
Inverted Edwards Coordinates....Pages 20-27
Spectra of Boolean Functions, Subspaces of Matrices, and Going Up Versus Going Down....Pages 28-37
Efficient List Decoding of Explicit Codes with Optimal Redundancy....Pages 38-46
Algebraic Structure Theory of Tail-Biting Trellises....Pages 47-47
Nice Codes from Nice Curves....Pages 48-49
Generalized Sudan’s List Decoding for Order Domain Codes....Pages 50-59
Bent Functions and Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA....Pages 60-71
Determining the Nonlinearity of a New Family of APN Functions....Pages 72-79
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths....Pages 80-89
Space-Time Codes from Crossed Product Algebras of Degree 4 ....Pages 90-99
On Non-randomness of the Permutation After RC4 Key Scheduling....Pages 100-109
Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes....Pages 110-119
Fault-Tolerant Finite Field Computation in the Public Key Cryptosystems....Pages 120-129
Constructions of Orthonormal Lattices and Quaternion Division Algebras for Totally Real Number Fields....Pages 130-137
Quaternary Plotkin Constructions and Quaternary Reed-Muller Codes....Pages 138-147
Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes....Pages 148-157
On the Key-Privacy Issue of McEliece Public-Key Encryption....Pages 158-167
Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function....Pages 168-177
Linear Complexity and Autocorrelation of Prime Cube Sequences....Pages 178-187
The “Art of Trellis Decoding” Is NP-Hard....Pages 188-197
On the Structure of Inversive Pseudorandom Number Generators....Pages 198-207
Subcodes of Reed-Solomon Codes Suitable for Soft Decoding....Pages 208-216
Normalized Minimum Determinant Calculation for Multi-block and Asymmetric Space-Time Codes....Pages 217-226
On the Computation of Non-uniform Input for List Decoding on Bezerra-Garcia Tower....Pages 227-236
Dense MIMO Matrix Lattices — A Meeting Point for Class Field Theory and Invariant Theory....Pages 237-246
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks....Pages 247-256
Links Between Discriminating and Identifying Codes in the Binary Hamming Space....Pages 257-266
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity....Pages 267-270
A Path to Hadamard Matrices....Pages 271-280
The Tangent FFT....Pages 281-290
Novel Algebraic Structure for Cyclic Codes....Pages 291-300
Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over GF(p,2)....Pages 301-310
Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions ? 9 Variable Boolean Functions with Nonlinearity 242....Pages 311-320
On Quasi-cyclic Codes over Integer Residue Rings....Pages 321-329
Extended Norm-Trace Codes with Optimized Correction Capability....Pages 330-336
On Generalized Hamming Weights and the Covering Radius of Linear Codes....Pages 337-346
Back Matter....Pages 347-356
Homomorphic Encryptions of Sums of Groups....Pages -
....Pages 357-366