Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Computers --- Access control --- #TELE:SISTA --- 681.3*E3 --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Computers - Access control.
Choose an application
This book presents a selection of the papers presented at EUROCODE '90, the symposium on coding theory held in Udine, Italy, November 1990. It gives the state of the art on coding in Europe and ranges from theoretical top- ics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and VLSI implementation. The book is divided into eight sections: - Algebraic codes - Combinatorial codes - Geometric codes - Protection of information - Convolutional codes - Information theory - Modulation - Applications of coding. Five of the sections are introduced by an invited contribution.
Coding theory --- -681.3*E3 --- 681.3*E4 --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Congresses --- Data encryption: data encryption standard; DES; public key cryptosystems --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 --- Information theory. --- Data encryption (Computer science). --- Coding theory. --- Theory of Computation. --- Discrete Mathematics. --- Cryptology. --- Coding and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics
Choose an application
Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.
Bedieningstheorie --- Chiffres --- Cijfers --- Ciphers --- Commande [Theorie de la ] --- Control theory --- Stabiliteit --- Stability --- Stabilité --- Chiffres (Cryptographie) --- Théorie de la commande --- 681.3*E3 --- Dynamics --- Mechanics --- Motion --- Vibration --- Benjamin-Feir instability --- Equilibrium --- Machine theory --- Codes --- Contractions --- Signs and symbols --- Symbolism --- Abbreviations --- Code names --- Cryptography --- Writing --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Théorie de la commande --- Stabilité --- Stream ciphers --- State ciphers --- Control theory. --- Stability. --- Ciphers. --- Data encryption (Computer science). --- Computer security. --- Operating systems (Computers). --- Numerical analysis. --- Cryptology. --- Systems and Data Security. --- Operating Systems. --- Numerical Analysis. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Mathematical analysis --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Security measures
Choose an application
History of France --- Limoux --- France --- Frankrijk --- Histoire locale --- Plaatselijke geschiedenis --- 001708.jpg --- Graal --- Epical, mythological and fictitious figures --- Cryptography --- Grail --- Merovingians --- Treasure troves --- Gral --- Gréal --- Holy Grail --- Sangraal --- Sangreal --- Chalices --- Folklore --- Buried treasure --- Sunken treasure --- Treasure-trove --- Lost articles --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Rennes-le-Château Region (France) --- History. --- Algemeen publiek
Choose an application
cryptografie --- Electrical engineering --- Coding theory --- Cryptography --- Codage --- Cryptographie --- Periodicals. --- Périodiques --- Combinatorial designs and configurations --- Configurations et schémas combinatoires --- Coding theory. --- Combinatorial designs and configurations. --- Cryptography. --- #TS:WBIB --- Periodicals --- Information Technology --- Computer Security Confidentiality --- Combinatorics --- Number Theory --- Mathematical Sciences --- Applied Mathematics --- Information Technology. --- Number Theory. --- Mathematical Sciences. --- Kryptologie --- Configurations and designs, Combinatorial --- Designs and configurations, Combinatorial --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Geheimcodetechnik --- Kryptografie --- Kryptographie --- Datenverschlüsselung --- Combinatorial analysis --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Chiffrierung --- Steganographie --- Kryptologe --- Datenverschlüsselung
Listing 1 - 5 of 5 |
Sort by
|