Coding and Cryptography : : Synergy for a Robust Communication / / Natasa Zivic.
This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integrat...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Berlin ;, Boston : : Oldenbourg Wissenschaftsverlag, , [2013] ©2013 |
Year of Publication: | 2013 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (126 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Other title: | Frontmatter -- Abstract -- Table of Contents -- 1. Introduction -- 2. Fundamentals -- 3. Related Work -- 4. Soft Input Hard Verification -- 5. Applications of Soft Input Bit Inversion -- 6. Soft Verification of the Message Authentication Codes -- 7. Security Aspects of Soft Input Soft Verification -- 8. Soft Output of Soft Input Soft Verification -- 9. Applications of Soft Input Soft Verification -- 10. Summary and Future Work -- Epilogue -- Works Cited -- List of Abbreviations |
---|---|
Summary: | This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or “hard” verification, but even more after the introduction of “soft” verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from “hard” to “soft”, which results in much better results. |
Format: | Mode of access: Internet via World Wide Web. |
ISBN: | 9783486781267 9783110238570 9783110238518 9783110637212 9783110342666 |
DOI: | 10.1524/9783486781267 |
Access: | restricted access |
Hierarchical level: | Monograph |
Statement of Responsibility: | Natasa Zivic. |