


default search action
17. AAECC 2007: Bangalore, India
- Serdar Boztas, Hsiao-feng Lu:

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4851, Springer 2007, ISBN 978-3-540-77223-1
Invited Contributions
- Venkatesan Guruswami:

List Decoding and Pseudorandom Constructions. 1-6 - Sondre Rønjom, Guang Gong, Tor Helleseth:

A Survey of Recent Attacks on the Filter Generator. 7-17 - Tom Høholdt, Jørn Justesen:

Iterative List Decoding of LDPC Codes. 18-19 - Daniel J. Bernstein, Tanja Lange:

Inverted Edwards Coordinates. 20-27 - Gary McGuire:

Spectra of Boolean Functions, Subspaces of Matrices, and Going Up Versus Going Down. 28-37 - Atri Rudra:

Efficient List Decoding of Explicit Codes with Optimal Redundancy. 38-46 - Priti Shankar:

Algebraic Structure Theory of Tail-Biting Trellises. 47 - Henning Stichtenoth:

Nice Codes from Nice Curves. 48-49
Regular Contributions
- Olav Geil, Ryutaroh Matsumoto:

Generalized Sudan's List Decoding for Order Domain Codes. 50-59 - Jianqin Zhou, Wai Ho Mow, Xiaoping Dai:

Bent Functions and Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA. 60-71 - Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire:

Determining the Nonlinearity of a New Family of APN Functions. 72-79 - Koji Nuida

, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. 80-89 - Grégory Berhuy, Frédérique E. Oggier:

Space-Time Codes from Crossed Product Algebras of Degree 4. 90-99 - Goutam Paul, Subhamoy Maitra, Rohit Srivastava:

On Non-randomness of the Permutation After RC4 Key Scheduling. 100-109 - Kenji Yasunaga, Toru Fujiwara:

Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes. 110-119 - Silvana Medos, Serdar Boztas:

Fault-Tolerant Finite Field Computation in the Public Key Cryptosystems. 120-129 - Yann Laigle-Chapuy:

A Note on a Class of Quadratic Permutations over F2n. 130-137 - B. A. Sethuraman, Frédérique E. Oggier:

Constructions of Orthonormal Lattices and Quaternion Division Algebras for Totally Real Number Fields. 138-147 - Jaume Pujol, Josep Rifà

, Faina I. Solov'eva:
Quaternary Plotkin Constructions and Quaternary Reed-Muller Codes. 148-157 - Haruhiko Kaneko, Eiji Fujiwara:

Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes. 158-167 - Shigenori Yamakawa, Yang Cui, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai:

On the Key-Privacy Issue of McEliece Public-Key Encryption. 168-177 - Dinesh Krithivasan, S. Sandeep Pradhan:

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function. 178-187 - Young-Joon Kim, Seok-Yong Jin, Hong-Yeop Song:

Linear Complexity and Autocorrelation of Prime Cube Sequences. 188-197 - Navin Kashyap:

The "Art of Trellis Decoding" Is NP-Hard. 198-207 - Harald Niederreiter, Arne Winterhof

:
On the Structure of Inversive Pseudorandom Number Generators. 208-216 - Safitha J. Raj, Andrew Thangaraj:

Subcodes of Reed-Solomon Codes Suitable for Soft Decoding. 217-226 - Camilla Hollanti

, Hsiao-feng Lu:
Normalized Minimum Determinant Calculation for Multi-block and Asymmetric Space-Time Codes. 227-236 - M. Prem Laxman Das

, Kripasindhu Sikdar:
On the Computation of Non-uniform Input for List Decoding on Bezerra-Garcia Tower. 237-246 - Jyrki T. Lahtonen, Roope Vehkalahti

:
Dense MIMO Matrix Lattices - A Meeting Point for Class Field Theory and Invariant Theory. 247-256 - Kazuki Yoneyama, Haruki Ota, Kazuo Ohta:

Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. 257-266 - Irène Charon, Gérard D. Cohen, Olivier Hudry, Antoine Lobstein:

Links Between Discriminating and Identifying Codes in the Binary Hamming Space. 267-270 - Sumanta Sarkar, Subhamoy Maitra:

Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity. 271-280 - P. Embury, Asha Rao:

A Path to Hadamard Matrices. 281-290 - Daniel J. Bernstein:

The Tangent FFT. 291-300 - Dang Hoai Bac, Nguyen Binh, Nguyen Xuan Quynh:

Novel Algebraic Structure for Cyclic Codes. 301-310 - Nimalsiri Pinnawala, Asha Rao, T. Aaron Gulliver:

Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over GF ( p , 2). 311-320 - Selçuk Kavut, Melek D. Yücel:

Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 Variable Boolean Functions with Nonlinearity 242. 321-329 - Maheshanand, Siri Krishan Wasan:

On Quasi-cyclic Codes over Integer Residue Rings. 330-336 - Maria Bras-Amorós

, Michael E. O'Sullivan
:
Extended Norm-Trace Codes with Optimized Correction Capability. 337-346 - Heeralal Janwa, Arbind K. Lal:

On Generalized Hamming Weights and the Covering Radius of Linear Codes. 347-356 - Akihiro Yamamura

:
Homomorphic Encryptions of Sums of Groups. 357-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














