Skip to main content
  • Conference proceedings
  • © 2006

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings

Conference proceedings info: AAECC 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. On Generalized Parity Checks

    • Robert J. McEliece, Edwin Soedarmadji
    Pages 29-34
  3. Cryptography Based on Bilinear Maps

    • Tatsuaki Okamoto
    Pages 35-50
  4. Quantum Period Reconstruction of Binary Sequences

    • Florina Piroi, Arne Winterhof
    Pages 60-67
  5. A General Framework for Applying FGLM Techniques to Linear Codes

    • M. Borges-Quintana, M. A. Borges-Trenard, E. Martínez-Moro
    Pages 76-86
  6. A Theory of Highly Nonlinear Functions

    • K. J. Horadam
    Pages 87-100
  7. A Class of Fermat Curves for which Weil-Serre’s Bound Can Be Improved

    • Francis N. Castro, Ernesto Gomez, Oscar Moreno
    Pages 128-135
  8. Nonbinary Quantum Codes from Hermitian Curves

    • Pradeep Kiran Sarvepalli, Andreas Klappenecker
    Pages 136-143
  9. A Genetic Algorithm for Cocyclic Hadamard Matrices

    • V. Álvarez, J. A. Armario, M. D. Frau, P. Real
    Pages 144-153
  10. Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication

    • Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
    Pages 154-162
  11. A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI

    • Nobuyuki Sugio, Shunichi Nambu, Toshinobu Kaneko
    Pages 163-172
  12. On Achieving Chosen Ciphertext Security with Decryption Errors

    • Yang Cui, Kazukuni Kobara, Hideki Imai
    Pages 173-182
  13. Applying Fujisaki-Okamoto to Identity-Based Encryption

    • Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai
    Pages 183-192
  14. A Short Random Fingerprinting Code Against a Small Number of Pirates

    • Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai
    Pages 193-202

Other Volumes

  1. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Editors and Affiliations

  • Department of Electrical Engineering, University of Hawaii, Honolulu, USA

    Marc P. C. Fossorier

  • National Institute of Advanced Industrial Science and Technology (AIST), Research Center for Information Security (RCIS),  

    Hideki Imai

  • Department of Electrical and Computer Engineering, University of California, Davis,  

    Shu Lin

  • University Paul Sabatier, AAECC/IRIT, Toulouse cedex, France

    Alain Poli

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access