What is included with this book?
A Signature Scheme with Efficient Proof of Validity | p. 1 |
Secret-Sharing Schemes: A Survey | p. 11 |
Lattice Codes for the Gaussian Wiretap Channel | p. 47 |
List Decoding for Binary Goppa Codes | p. 62 |
Faster 2-Regular Information-Set Decoding | p. 81 |
Ideal Secret Sharing Schemes for Useful Multipartite Access Structures | p. 99 |
Loiss: A Byte-Oriented Stream Cipher | p. 109 |
Secure Message Transmission by Public Discussion: A Brief Survey | p. 126 |
Variations on Encoding Circuits for Stabilizer Quantum Codes | p. 142 |
Algorithms for the Shortest and Closest Lattice Vector Problems | p. 159 |
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic | p. 191 |
The Minimum Distance of Graph Codes | p. 201 |
Local Duality and the Discrete Logarithm Problem | p. 213 |
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems | p. 223 |
Arithmetic of Split Kummer Surfaces: Montgomery Endomorphism of Edwards Products | p. 238 |
A New Family of Quadriphase Sequences with Low Correlation | p. 246 |
On the Link of Some Semi-bent Functions with Kloosterman Sums | p. 263 |
Locally Decodable Codes: A Brief Survey | p. 273 |
On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem | p. 283 |
Author Index | p. 295 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.