Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Cryptography and Coding

Best Price (Coupon Required):
Buy Cryptography and Coding for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540453253
Condition
New
Product Description

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of Cryptography and Coding was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Untersuchung von Walzlen und Walzlemulsionen im Kaltwalzversuch

Untersuchung von Walzlen und Walzlemulsionen im Kaltwalzversuch

$59.99
Medizinische Therapie 2005/ 2006

Medizinische Therapie 2005/ 2006

$69.99
Employee Assistance Programs

Employee Assistance Programs

$39.99
Die Entstehung der deutschen Schriftsprache

Die Entstehung der deutschen Schriftsprache

$59.99
Resilience, Response, and Risk in Water Systems

Resilience, Response, and Risk in Water Systems

$84.99
Behinderung im Fernsehen

Behinderung im Fernsehen

$69.99
Satisfying Reason

Satisfying Reason

$119.00
Learning and Collaboration Technologies

Learning and Collaboration Technologies

$99.99
Die biochemischen Leistungen photosynthetisierender Bakterien im Abwasser

Die biochemischen Leistungen photosynthetisierender Bakterien im Abwasser

$54.99
Evolving Concepts in Sepsis and Septic Shock

Evolving Concepts in Sepsis and Septic Shock

$289.00
Entkoppelt und institutionalisiert

Entkoppelt und institutionalisiert

$49.99
Uranus, Neptune, and Pluto and How to Observe Them

Uranus, Neptune, and Pluto and How to Observe Them

$44.99
Cultures of Violence

Cultures of Violence

$84.99
Erkrankungen der Kieferhhle

Erkrankungen der Kieferhhle

$119.99
Theoretical Methods in Condensed Phase Chemistry

Theoretical Methods in Condensed Phase Chemistry

$39.99
Organized Adaption in Multi-Agent Systems

Organized Adaption in Multi-Agent Systems

$39.99
The Story of the Easter Bunny by Katherine Tegen

The Story of the Easter Bunny by Katherine Tegen

$12.99
Die Medien in Osteuropa

Die Medien in Osteuropa

$59.99
Commutative Harmonic Analysis II

Commutative Harmonic Analysis II

$39.99
Produktpiraterie

Produktpiraterie

$69.99
Tradition-Based Natural Resource Management

Tradition-Based Natural Resource Management

$64.99
High-speed Serial Buses in Embedded Systems

High-speed Serial Buses in Embedded Systems

$199.99
Creating Cool MINDSTORMS NXT Robots

Creating Cool MINDSTORMS NXT Robots

$39.99
Conflict: Human Needs Theory

Conflict: Human Needs Theory

$34.99
Myelogenetisch-Anatomische Untersuchungen ber den Zentralen Abschnitt der Sehleitung

Myelogenetisch-Anatomische Untersuchungen ber den Zentralen Abschnitt der Sehleitung

$59.99
Comprehensive Healthcare Simulation: Program & Center Development

Comprehensive Healthcare Simulation: Program & Center Development

$79.99
Sind die Mewerte des Uster-Ungleichmigkeits-Prfgertes ein Abbild der wirklich vorhandenen Masse

Sind die Mewerte des Uster-Ungleichmigkeits-Prfgertes ein Abbild der wirklich vorhandenen Masse

$59.99
Operational Quantum Theory II

Operational Quantum Theory II

$129.00
Elektrotechnik

Elektrotechnik

$84.99
Statistics Applied With Excel

Statistics Applied With Excel

$89.99
Exotic Atoms in Condensed Matter

Exotic Atoms in Condensed Matter

$109.99
Helioseismic Diagnostics of Solar Convection and Activity

Helioseismic Diagnostics of Solar Convection and Activity

$219.99
Glucocorticoid Hormone Action

Glucocorticoid Hormone Action

$109.99
New Right, New Racism

New Right, New Racism

$74.99
Halbexakte Homotopiefunktoren

Halbexakte Homotopiefunktoren

$19.99
Balancing Copyright Law in the Digital Age

Balancing Copyright Law in the Digital Age

$54.99
Citizen, Territory and Technologies: Smart Learning Contexts and Practices

Citizen, Territory and Technologies: Smart Learning Contexts and Practices

$169.99
The Future of Knowledge Management

The Future of Knowledge Management

$149.00
Praktische Organisationsanalyse

Praktische Organisationsanalyse

$39.99
La hermanita de las nieras #1: La bruja de Karen (Karen's Witch)

La hermanita de las nieras #1: La bruja de Karen (Karen's Witch)

$8.24
previous
next