Coding and Cryptography : : Synergy for a Robust Communication / / Natasa Zivic.

This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integrat...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1
VerfasserIn:
Place / Publishing House:Berlin ;, Boston : : Oldenbourg Wissenschaftsverlag, , [2013]
©2013
Year of Publication:2013
Language:English
Online Access:
Physical Description:1 online resource (126 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Other title:Frontmatter --
Abstract --
Table of Contents --
1. Introduction --
2. Fundamentals --
3. Related Work --
4. Soft Input Hard Verification --
5. Applications of Soft Input Bit Inversion --
6. Soft Verification of the Message Authentication Codes --
7. Security Aspects of Soft Input Soft Verification --
8. Soft Output of Soft Input Soft Verification --
9. Applications of Soft Input Soft Verification --
10. Summary and Future Work --
Epilogue --
Works Cited --
List of Abbreviations
Summary:This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or “hard” verification, but even more after the introduction of “soft” verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from “hard” to “soft”, which results in much better results.
Format:Mode of access: Internet via World Wide Web.
ISBN:9783486781267
9783110238570
9783110238518
9783110637212
9783110342666
DOI:10.1524/9783486781267
Access:restricted access
Hierarchical level:Monograph
Statement of Responsibility: Natasa Zivic.