## Coding and Cryptography: International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected PapersThisvolumecontainsrefereedpapersdevotedtocodingandcryptography.These papers arethe full versionsof a selectionof the best extended abstractsaccepted for presentation at the International Workshop on Coding and Cryptography (WCC 2005) held in Bergen, Norway, March 14–18, 2005. Each of the 118 - tended abstracts originallysubmitted to the workshop were reviewed by at least two members of the Program Committee. As a result of this screening process, 58 papers were selected for presentation, of which 52 were eventually presented at the workshop together with four invited talks. The authors of the presented papers were in turn invited to submit full v- sions of their papers to the full proceedings. Each of the full-version submissions were once again thoroughly examined and commented upon by at least two reviewers. This volume is the end result of this long process. I am grateful to the reviewers who contributed to guaranteeing the high standards of this volume, and who are named on the next pages. It was a pl- sure for me to work with my program co-chair Pascale Charpin, whose expe- enced advice I havefurther bene?ted greatly from during the preparationof this ́ volume. Discussions with Tor Helleseth and Angela Barbero were also useful in putting the volume together. Finally, I would like to thank all the authors and all the other participants of the WCC 2005 for making it in every sense a highly enjoyable event. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Other editions - View all

### Common terms and phrases

aﬃne algebraic attacks algebraic immunity algebraic normal form binary bits Boolean function bound braid groups codewords columns compute the key consider construction Corollary corresponding Cryptography cryptosystem cyclic codes deﬁned Deﬁnition degree denote diﬀerent diﬀerential discrete logarithm DNA code eﬃcient elements equations errors exists FH/TH ﬁltering ﬁnd ﬁnding ﬁnite ﬁeld ﬁrst flat Gabidulin code GC-content GF(p GF(pk GF(q graph Hamming weight hash chain IEEE input interlace polynomial inverse irreducible key assignment scheme keystream Lemma LFSR linear codes LNCS matrix minimal polynomial monoid multiple NLFSR nonzero obtained output sequence pair parameters PMEPR polyphase sequences positive integer primitive problem Proof properties protocol public key r-secure rank distance Reed–Solomon codes result rooted tree hierarchy secondary structure self-dual code solution space-time code Springer-Verlag Theorem Theory transform variables vector veriﬁed Ytrehus zero