Coding and Cryptology

Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings

  • Yeow Meng Chee
  • Zhenbo Guo
  • San Ling
  • Fengjing Shao
  • Yuansheng Tang
  • Huaxiong Wang
  • Chaoping Xing
Conference proceedings IWCC 2011

DOI: 10.1007/978-3-642-20901-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6639)

Table of contents (19 papers)

  1. Front Matter
  2. A Signature Scheme with Efficient Proof of Validity
    Masayuki Abe, Miyako Ohkubo
    Pages 1-10
  3. Secret-Sharing Schemes: A Survey
    Amos Beimel
    Pages 11-46
  4. Lattice Codes for the Gaussian Wiretap Channel
    Jean-Claude Belfiore, Frédérique Oggier, Patrick Solé
    Pages 47-61
  5. List Decoding for Binary Goppa Codes
    Daniel J. Bernstein
    Pages 62-80
  6. Faster 2-Regular Information-Set Decoding
    Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
    Pages 81-98
  7. Loiss: A Byte-Oriented Stream Cipher
    Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
    Pages 109-125
  8. Secure Message Transmission by Public Discussion: A Brief Survey
    Juan Garay, Clint Givens, Rafail Ostrovsky
    Pages 126-141
  9. Algorithms for the Shortest and Closest Lattice Vector Problems
    Guillaume Hanrot, Xavier Pujol, Damien Stehlé
    Pages 159-190
  10. The Minimum Distance of Graph Codes
    Tom Høholdt, Jørn Justesen
    Pages 201-212
  11. A New Family of Quadriphase Sequences with Low Correlation
    Jie Li, Xiangyong Zeng, Lei Hu
    Pages 246-262
  12. On the Link of Some Semi-bent Functions with Kloosterman Sums
    Sihem Mesnager, Gérard Cohen
    Pages 263-272
  13. Locally Decodable Codes: A Brief Survey
    Sergey Yekhanin
    Pages 273-282

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Keywords

cryptographic protocols elliptic curve cryptography multipartite computation secret sharing signature schemes

Editors and affiliations

  • Yeow Meng Chee
    • 1
  • Zhenbo Guo
    • 2
  • San Ling
    • 1
  • Fengjing Shao
    • 3
  • Yuansheng Tang
    • 4
  • Huaxiong Wang
    • 1
  • Chaoping Xing
    • 1
  1. 1.School of Physical and Mathematical Sciences, Division of Mathematical SciencesNanyang Technological UniversitySingapore
  2. 2.College of Information EngineeringQingdao UniversityShandongP.R. China
  3. 3.Qingdao UniversityShandongP.R. China
  4. 4.School of Mathematical SciencesYangzhou UniversityJiangsuP.R. China

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-20900-0
  • Online ISBN 978-3-642-20901-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349