![cover of the book Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings](/covers/files_200/110000/9e5e4da70dbd5322c7d24c2b073736b6-d.jpg)
Ebook: Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings
Author: Claude Carlet Keqin Feng (auth.) Yeow Meng Chee Chao Li San Ling Huaxiong Wang Chaoping Xing (eds.)
- Genre: Education // International Conferences and Symposiums
- Tags: Coding and Information Theory, Data Encryption, Discrete Mathematics in Computer Science, Computer Communication Networks
- Series: Lecture Notes in Computer Science 5557 : Security and Cryptology
- Year: 2009
- Publisher: Springer-Verlag Berlin Heidelberg
- City: Oxford
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.
The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.
The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.