Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Cryptography and Coding

Best Price (Coupon Required):
Buy Cryptography and Coding for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540453253
Condition
New
Product Description

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of Cryptography and Coding was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Authenticity as Performativity on Social Media

Authenticity as Performativity on Social Media

$109.99
Jasmonate in Plant Biology

Jasmonate in Plant Biology

$169.99
Friendship Club / El Club de la Amistad (Alma's Way) (Bilingual)

Friendship Club / El Club de la Amistad (Alma's Way) (Bilingual)

$4.49
Business Process Management Workshops

Business Process Management Workshops

$54.99
Depth From Defocus: A Real Aperture Imaging Approach

Depth From Defocus: A Real Aperture Imaging Approach

$109.99
Verantwortung im Betrieb

Verantwortung im Betrieb

$59.99
Fhrung: Feedback auf Augenhhe

Fhrung: Feedback auf Augenhhe

$17.99
Policy Response, Local Service Delivery, and Governance in Bangladesh, Nepal, and Sri Lanka

Policy Response, Local Service Delivery, and Governance in Bangladesh, Nepal, and Sri Lanka

$159.99
Neue Impulse im Kulturtourismus

Neue Impulse im Kulturtourismus

$64.99
Heitere Ferientage

Heitere Ferientage

$59.99
Die Dummheit der Informationsgesellschaft

Die Dummheit der Informationsgesellschaft

$49.99
Environmental Pollution Governance and Ecological Remediation Technology

Environmental Pollution Governance and Ecological Remediation Technology

$189.00
Mega Robo Bros - Freddy vs. School: Freddy vs. School: The Rival

Mega Robo Bros - Freddy vs. School: Freddy vs. School: The Rival

$5.99
Junior Learning Beanstalk Books Decodable Big Books Fiction Xl Books

Junior Learning Beanstalk Books Decodable Big Books Fiction Xl Books

$41.99
S.M.A.R.T. Circle Overview

S.M.A.R.T. Circle Overview

$54.99
Three-Dimensional Image Reconstruction in Radiology and Nuclear Medicine

Three-Dimensional Image Reconstruction in Radiology and Nuclear Medicine

$109.99
Hybrid Fault Tolerance Techniques to Detect Transient Faults in Embedded Processors

Hybrid Fault Tolerance Techniques to Detect Transient Faults in Embedded Processors

$109.99
Physik fr Ingenieure

Physik fr Ingenieure

$49.99
Applied Behavior Analysis for Children with Autism Spectrum Disorders

Applied Behavior Analysis for Children with Autism Spectrum Disorders

$89.00
Amnesie, Amnestie oder Aufarbeitung?

Amnesie, Amnestie oder Aufarbeitung?

$64.99
Dictionary of Pharmaceutical Medicine

Dictionary of Pharmaceutical Medicine

$179.99
Relativity in Rotating Frames

Relativity in Rotating Frames

$219.99
Denkhaltungen im Design

Denkhaltungen im Design

$59.99
Understanding Matrix Structures and their Alternatives

Understanding Matrix Structures and their Alternatives

$79.99
Modern Analysis of Value Theory

Modern Analysis of Value Theory

$54.99
SAP R/3 Kommunikation mit RFC und Visual Basic

SAP R/3 Kommunikation mit RFC und Visual Basic

$59.99
Transfer Matrix Method

Transfer Matrix Method

$54.99
Die groen Schwellenlnder

Die groen Schwellenlnder

$59.99
Calciumcarbonat

Calciumcarbonat

$129.00
Foundations of Real-Time Computing: Scheduling and Resource Management

Foundations of Real-Time Computing: Scheduling and Resource Management

$129.00
Hypertension

Hypertension

$89.00
Ginkgo Biloba A Global Treasure

Ginkgo Biloba A Global Treasure

$129.00
Field Theory, Quantum Gravity and Strings II

Field Theory, Quantum Gravity and Strings II

$39.99
Great Nonfiction for Grades 2-3

Great Nonfiction for Grades 2-3

$72.00
Die knstlichen Paradiese

Die knstlichen Paradiese

$64.99
Rechtsgrundlagen fr den Bankfachwirt

Rechtsgrundlagen fr den Bankfachwirt

$84.99
Atlas of Peripheral Nerve Ultrasound

Atlas of Peripheral Nerve Ultrasound

$129.99
rtliche Betubung: Plexus Brachialis

rtliche Betubung: Plexus Brachialis

$54.99
That's Not What I Heard (Hardcover)

That's Not What I Heard (Hardcover)

$14.24
The Regulation of Motor Vehicle and Traffic Safety

The Regulation of Motor Vehicle and Traffic Safety

$84.99
previous
next