Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Cryptography and Coding

Best Price (Coupon Required):
Buy Cryptography and Coding for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540453253
Condition
New
Product Description

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of Cryptography and Coding was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

From Newton to Chaos

From Newton to Chaos

$219.99
Being an Early Career Feminist Academic

Being an Early Career Feminist Academic

$32.99
Parallel-in-Time Integration Methods

Parallel-in-Time Integration Methods

$149.00
Introduction to Robust and Quasi-Robust Statistical Methods

Introduction to Robust and Quasi-Robust Statistical Methods

$54.99
Bones and Muscles

Bones and Muscles

$5.21
Decision Technologies for Computational Finance

Decision Technologies for Computational Finance

$219.99
Warentest und Konsumgter-Marketing

Warentest und Konsumgter-Marketing

$59.99
Robuste Regelung

Robuste Regelung

$54.99
Synergies between Solar and Stellar Modelling

Synergies between Solar and Stellar Modelling

$279.99
EDV-Einsatz in Krankenanstalten

EDV-Einsatz in Krankenanstalten

$59.99
Bildverarbeitung fr die Medizin 2012

Bildverarbeitung fr die Medizin 2012

$99.00
Chemistry and Technology of Cyanate Ester Resins

Chemistry and Technology of Cyanate Ester Resins

$259.00
Algorithmic Learning Theory

Algorithmic Learning Theory

$39.99
Accuracy Enhancement Technologies for Micromachining Processes

Accuracy Enhancement Technologies for Micromachining Processes

$84.99
Ruedo como puedo

Ruedo como puedo

$4.49
Modeling Coastal Hypoxia

Modeling Coastal Hypoxia

$189.00
Imaging Diagnostics in Pancreatic Cancer

Imaging Diagnostics in Pancreatic Cancer

$84.99
Classifications and Scores of the Shoulder

Classifications and Scores of the Shoulder

$109.99
Der Pltzliche Herztod

Der Pltzliche Herztod

$59.99
The Biology of Neuropeptide Y and Related Peptides

The Biology of Neuropeptide Y and Related Peptides

$169.99
Die Berechenbarkeit der Zukunft

Die Berechenbarkeit der Zukunft

$29.99
Inductive Logic Programming

Inductive Logic Programming

$69.99
Intelligence Measurement and School Performance in Latin America

Intelligence Measurement and School Performance in Latin America

$54.99
Beckett Ongoing

Beckett Ongoing

$139.99
Best Practices in Lean Manufacturing

Best Practices in Lean Manufacturing

$59.99
Adversary-Aware Learning Techniques and Trends in Cybersecurity

Adversary-Aware Learning Techniques and Trends in Cybersecurity

$159.99
Numerische Methoden bei Optimierungsaufgaben Band 3

Numerische Methoden bei Optimierungsaufgaben Band 3

$44.99
Software-Qualittssicherung

Software-Qualittssicherung

$59.99
Sustainability in Energy Business and Finance

Sustainability in Energy Business and Finance

$149.00
Perioperative Fluid Management

Perioperative Fluid Management

$199.99
Reactive Oxygen Species in Chemistry, Biology, and Medicine

Reactive Oxygen Species in Chemistry, Biology, and Medicine

$54.99
Conservative Parties and Right-Wing Politics in North America

Conservative Parties and Right-Wing Politics in North America

$59.99
Recent Findings in Boolean Techniques

Recent Findings in Boolean Techniques

$109.99
Epiblast Stem Cells

Epiblast Stem Cells

$84.99
Python Testing with Selenium

Python Testing with Selenium

$54.99
Facets of Systems Science

Facets of Systems Science

$299.00
Literature, Science, and Animal Advocacy in Canada

Literature, Science, and Animal Advocacy in Canada

$89.00
Process Theories

Process Theories

$109.99
Condensed Matter Theories

Condensed Matter Theories

$39.99
Status and Organizations

Status and Organizations

$84.99
previous
next