Coding and Cryptology: Second International Workshop, IWCC 2009

Front Cover
Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Springer Science & Business Media, May 20, 2009 - Computers - 275 pages
0 Reviews
The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian Province, China, during June 11-15, 2007 and attracted over 80 participants. Following this s- cess, the second IWCC was held June 1-5, 2009 at Zhangjiajie, Hunan Province, China. Zhangjiajie is one of the most scenic areas in China. The proceedings of this workshop consist of 21 technical papers, covering a wide range of topics in coding and cryptology, as well as related ?elds such as combinatorics. All papers, except one, are contributed by the invited speakers of the workshop and each paper has been carefully reviewed. We are grateful to the external reviewers for their help, which has greatly strengthened the quality of the proceedings. IWCC 2009 was co-organizedby the National University of Defense Techn- ogy (NUDT), China and Nanyang Technological University (NTU), Singapore. We acknowledge with gratitude the ?nancial support from NUDT. We wouldliketo expressourthanks to Springer formaking it possible forthe proceedings to be published in the Lecture Notes in Computer Science series.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity
1
Separation and Witnesses
12
Binary Covering Arrays and Existentially Closed Graphs
22
A Class of ThreeWeight and FourWeight Codes
34
EqualWeight Fingerprinting Codes
43
Problems on TwoDimensional Synchronization Patterns
52
A New ClienttoClient PasswordAuthenticated Key Agreement Protocol
63
Elliptic Twin Prime Conjecture
77
On Weierstrass Semigroups of Some Triples on NormTrace Curves
146
A Polynomial Based Hashing Algorithm
157
A Survey of Algebraic Unitary Codes
171
New Family of NonCartesian Perfect Authentication Codes
188
On the Impossibility of Strong EncryptionOver aleph_0
202
Minimum Distance between Bent and Resilient Boolean Functions
219
Unconditionally Secure Approximate Message Authentication
233
Multiplexing Realizations of the DecimationHadamard Transform of TwoLevel Autocorrelation Sequences
248

Hunting for Curves with Many Points
82
List Decoding of Binary CodesA Brief Survey of Some Recent Results
97
Recent Developments in LowDensity ParityCheck Codes
107
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
124
On Cayley Graphs Surface Codes and the Limits of Homological Coding for Quantum Error Correction
259
Author Index
274
Copyright

Other editions - View all

Common terms and phrases

About the author (2009)

Chaoping Xing is Full Professor in the Department of Physical and Mathematical Sciences at Nanyang Technological University, Singapore.