Coding and Cryptology: Second International Workshop, IWCC by Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li,

By Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing (eds.)

This publication constitutes the refereed court cases of the second one overseas Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.

The 21 revised complete technical papers, other than one, are contributed by means of the invited audio system of the workshop. The papers have been conscientiously chosen in the course of rounds of reviewing and development for inclusion within the quantity and handle all elements of coding thought, cryptology and similar parts - similar to combinatorics - theoretical or utilized. subject matters addressed are coding conception, safe codes, hash services, combinatorics, boolean capabilities, authentication, cryptography, protocols, sequences, and safe communications.

Show description

Read Online or Download Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings PDF

Similar international conferences and symposiums books

Algorithmic Foundations of Robotics IX: Selected Contributions of the Ninth International Workshop on the Algorithmic Foundations of Robotics

Robotics is on the cusp of dramatic transformation. more and more advanced robots with extraordinary autonomy are discovering new purposes, from scientific surgical procedure, to building, to domestic prone. in contrast heritage, the algorithmic foundations of robotics have gotten extra an important than ever, in an effort to construct robots which are quickly, secure, trustworthy, and adaptive.

Evolutionary Computing: AISB Workshop Sheffield, UK, April 3–4, 1995 Selected Papers

This quantity relies at the Workshop on Evolutionary Computing held in Sheffield, U. ok. , in April 1995 less than the sponsorship of the Society for the learn of synthetic Intelligence and Simulation of habit (AISB). The 18 complete papers provided have been chosen in the course of a post-workshop refereeing assembly and selected from 32 submissions for the workshop.

Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003. Proceedings

This booklet constitutes the refereed court cases of the IFIP-TC6 8th - ternational convention on own instant Communications, PWC 2003. PWC 2003 is the ? agship convention of the IFIP operating workforce 6. eight, cellular and instant Communications, and is the preferable foreign discussion board for discussions among researchers, practitioners, and scholars drawn to the symbiosis of cellular computing and instant networks.

Theoretical Computer Science: 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, ... in Information and Communication Technology)

This ebook constitutes the refereed court cases of the sixth FIP WG 2. 2 foreign convention, TCS 2010, held as part of the 21th global desktop Congress, WCC 2010, in Brisbane, Australia, in September 2010. The 23 revised complete papers awarded, including four invited talks, have been conscientiously reviewed and chosen from 39 submissions.

Extra info for Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings

Sample text

Constructing strength three covering arrays with augmented annealing. Discrete Math. 308, 2709–2722 (2008) 10. : Roux-type constructions for covering arrays of strengths three and four. Designs, Codes and Cryptography 41, 33–57 (2006) 11. : Recursive constructions for covering arrays. Bayreuther Math. Schriften 74, 266–275 (2005) 12. : On t-covering arrays. Des. Codes Cryptogr. 32(13), 323–339 (2004) 13. edu/~ ccolbou/src/tabby 14. : Almost independent and weakly biased arrays: efficient constructions and cryptologic applications.

While most of the literature at present concentrates on the binary case (with the notable exception of [60]), the use of cyclotomic classes more generally affords constructions for covering arrays with larger alphabets. This is a current topic of investigation. Acknowledgements ¨ Thanks to Hadi Kharaghani and Patric Osterg˚ ard for helpful pointers to the literature. Research of the first author is supported by DOD grant N00014-08-1-1070. Binary Covering Arrays and Existentially Closed Graphs 31 Research of the second author is supported by the Hungarian National Research Fund, OTKA, Grant No.

In the semiprimitive case, the code CD punctured from the irreducible cyclic codes was dealt with in [8] and [7]. The objectives of this paper are to study the punctured codes CD in two other cases which are not semiprimitive, and present a class of three-weight codes and a class of four-weight codes. The two classes of codes presented in this paper contain optimal codes. Their duals contain also optimal codes. 2 Auxiliary Results To introduce the three-weight and four-weight codes, we need cyclotomic classes and Gaussian periods.

Download PDF sample

Rated 4.52 of 5 – based on 24 votes