Coding and Cryptology

Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings

  • Yeow Meng Chee
  • Chao Li
  • San Ling
  • Huaxiong Wang
  • Chaoping Xing
Conference proceedings IWCC 2009

DOI: 10.1007/978-3-642-01877-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5557)

Table of contents (21 papers)

  1. Front Matter
  2. Separation and Witnesses
    Gérard Cohen
    Pages 12-21
  3. Binary Covering Arrays and Existentially Closed Graphs
    Charles J. Colbourn, Gerzson Kéri
    Pages 22-33
  4. Equal-Weight Fingerprinting Codes
    Ilya Dumer
    Pages 43-51
  5. Elliptic Twin Prime Conjecture
    John B. Friedlander, Igor E. Shparlinski
    Pages 77-81
  6. Hunting for Curves with Many Points
    Gerard van der Geer
    Pages 82-96
  7. Recent Developments in Low-Density Parity-Check Codes
    Wen-Ching Winnie Li, Min Lu, Chenying Wang
    Pages 107-123
  8. ERINDALE: A Polynomial Based Hashing Algorithm
    V. Kumar Murty, Nikolajs Volkovs
    Pages 157-170
  9. A Survey of Algebraic Unitary Codes
    Frédérique Oggier
    Pages 171-187
  10. On the Impossibility of Strong Encryption Over \(\aleph_0\)
    Raphael C. -W. Phan, Serge Vaudenay
    Pages 202-218
  11. Unconditionally Secure Approximate Message Authentication
    Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt
    Pages 233-247

About these proceedings


This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.

The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.


access control algebraic attack block cipher boolean function coding theory combinatorial designs communication cryptanalysis cryptographic attacks cryptography cryptology cryptosystems cyclotomy decoding encryption schemes

Editors and affiliations

  • Yeow Meng Chee
    • 1
  • Chao Li
    • 2
  • San Ling
    • 1
  • Huaxiong Wang
    • 3
  • Chaoping Xing
    • 3
  1. 1.National Computer Systems, Center for Information Technology,Republic of Singapore
  2. 2.National University of Defense TechnologyChangshu HunanChina
  3. 3.National Computer Systems, Center for Information TechnologyRepublic of Singapore

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01813-8
  • Online ISBN 978-3-642-01877-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349