Coding and Cryptography : : Synergy for a Robust Communication / / Natasa Zivic.

This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integrat...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1
VerfasserIn:
Place / Publishing House:Berlin ;, Boston : : Oldenbourg Wissenschaftsverlag, , [2013]
©2013
Year of Publication:2013
Language:English
Online Access:
Physical Description:1 online resource (126 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783486781267
lccn 2014395121
ctrlnum (DE-B1597)219848
(OCoLC)900720586
collection bib_alma
record_format marc
spelling Zivic, Natasa, author. aut http://id.loc.gov/vocabulary/relators/aut
Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic.
Berlin ; Boston : Oldenbourg Wissenschaftsverlag, [2013]
©2013
1 online resource (126 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Abstract -- Table of Contents -- 1. Introduction -- 2. Fundamentals -- 3. Related Work -- 4. Soft Input Hard Verification -- 5. Applications of Soft Input Bit Inversion -- 6. Soft Verification of the Message Authentication Codes -- 7. Security Aspects of Soft Input Soft Verification -- 8. Soft Output of Soft Input Soft Verification -- 9. Applications of Soft Input Soft Verification -- 10. Summary and Future Work -- Epilogue -- Works Cited -- List of Abbreviations
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or “hard” verification, but even more after the introduction of “soft” verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from “hard” to “soft”, which results in much better results.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022)
Coding theory.
Cryptography.
Technology & Engineering / Engineering (General). bisacsh
Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1 9783110238570
Title is part of eBook package: De Gruyter DGBA Backlist Physical Sciences 2000-2014 (EN) 9783110238518
Title is part of eBook package: De Gruyter DGBA Physical Sciences 2000 - 2014 9783110637212 ZDB-23-GPS
Title is part of eBook package: De Gruyter eBook-Paket OWV  Elektrotechnik, Maschinenbau, Ingenieurswissenschaften 2013 9783110342666 ZDB-23-OEM
print 9783486752120
https://doi.org/10.1524/9783486781267
https://www.degruyter.com/isbn/9783486781267
Cover https://www.degruyter.com/document/cover/isbn/9783486781267/original
language English
format eBook
author Zivic, Natasa,
Zivic, Natasa,
spellingShingle Zivic, Natasa,
Zivic, Natasa,
Coding and Cryptography : Synergy for a Robust Communication /
Frontmatter --
Abstract --
Table of Contents --
1. Introduction --
2. Fundamentals --
3. Related Work --
4. Soft Input Hard Verification --
5. Applications of Soft Input Bit Inversion --
6. Soft Verification of the Message Authentication Codes --
7. Security Aspects of Soft Input Soft Verification --
8. Soft Output of Soft Input Soft Verification --
9. Applications of Soft Input Soft Verification --
10. Summary and Future Work --
Epilogue --
Works Cited --
List of Abbreviations
author_facet Zivic, Natasa,
Zivic, Natasa,
author_variant n z nz
n z nz
author_role VerfasserIn
VerfasserIn
author_sort Zivic, Natasa,
title Coding and Cryptography : Synergy for a Robust Communication /
title_sub Synergy for a Robust Communication /
title_full Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic.
title_fullStr Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic.
title_full_unstemmed Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic.
title_auth Coding and Cryptography : Synergy for a Robust Communication /
title_alt Frontmatter --
Abstract --
Table of Contents --
1. Introduction --
2. Fundamentals --
3. Related Work --
4. Soft Input Hard Verification --
5. Applications of Soft Input Bit Inversion --
6. Soft Verification of the Message Authentication Codes --
7. Security Aspects of Soft Input Soft Verification --
8. Soft Output of Soft Input Soft Verification --
9. Applications of Soft Input Soft Verification --
10. Summary and Future Work --
Epilogue --
Works Cited --
List of Abbreviations
title_new Coding and Cryptography :
title_sort coding and cryptography : synergy for a robust communication /
publisher Oldenbourg Wissenschaftsverlag,
publishDate 2013
physical 1 online resource (126 p.)
contents Frontmatter --
Abstract --
Table of Contents --
1. Introduction --
2. Fundamentals --
3. Related Work --
4. Soft Input Hard Verification --
5. Applications of Soft Input Bit Inversion --
6. Soft Verification of the Message Authentication Codes --
7. Security Aspects of Soft Input Soft Verification --
8. Soft Output of Soft Input Soft Verification --
9. Applications of Soft Input Soft Verification --
10. Summary and Future Work --
Epilogue --
Works Cited --
List of Abbreviations
isbn 9783486781267
9783110238570
9783110238518
9783110637212
9783110342666
9783486752120
callnumber-first M - Music
callnumber-label MLCM 2018/49888 (Q)
callnumber-sort MLCM 42018 549888 Q
url https://doi.org/10.1524/9783486781267
https://www.degruyter.com/isbn/9783486781267
https://www.degruyter.com/document/cover/isbn/9783486781267/original
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 620 - Engineering
dewey-ones 621 - Applied physics
dewey-full 621.3
dewey-sort 3621.3
dewey-raw 621.3
dewey-search 621.3
doi_str_mv 10.1524/9783486781267
oclc_num 900720586
work_keys_str_mv AT zivicnatasa codingandcryptographysynergyforarobustcommunication
status_str n
ids_txt_mv (DE-B1597)219848
(OCoLC)900720586
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1
Title is part of eBook package: De Gruyter DGBA Backlist Physical Sciences 2000-2014 (EN)
Title is part of eBook package: De Gruyter DGBA Physical Sciences 2000 - 2014
Title is part of eBook package: De Gruyter eBook-Paket OWV  Elektrotechnik, Maschinenbau, Ingenieurswissenschaften 2013
is_hierarchy_title Coding and Cryptography : Synergy for a Robust Communication /
container_title Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1
_version_ 1806145673459924992
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04758nam a22007935i 4500</leader><controlfield tag="001">9783486781267</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220424125308.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220424t20132013gw fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2014395121</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013940329</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783486781267</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1524/9783486781267</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)219848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900720586</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">MLCM 2018/49888 (Q)</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA268</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC009000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">621.3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6045</subfield><subfield code="2">rvk</subfield><subfield code="0">(DE-625)rvk/157497:</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zivic, Natasa, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coding and Cryptography :</subfield><subfield code="b">Synergy for a Robust Communication /</subfield><subfield code="c">Natasa Zivic.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">Oldenbourg Wissenschaftsverlag, </subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (126 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Abstract -- </subfield><subfield code="t">Table of Contents -- </subfield><subfield code="t">1. Introduction -- </subfield><subfield code="t">2. Fundamentals -- </subfield><subfield code="t">3. Related Work -- </subfield><subfield code="t">4. Soft Input Hard Verification -- </subfield><subfield code="t">5. Applications of Soft Input Bit Inversion -- </subfield><subfield code="t">6. Soft Verification of the Message Authentication Codes -- </subfield><subfield code="t">7. Security Aspects of Soft Input Soft Verification -- </subfield><subfield code="t">8. Soft Output of Soft Input Soft Verification -- </subfield><subfield code="t">9. Applications of Soft Input Soft Verification -- </subfield><subfield code="t">10. Summary and Future Work -- </subfield><subfield code="t">Epilogue -- </subfield><subfield code="t">Works Cited -- </subfield><subfield code="t">List of Abbreviations</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or “hard” verification, but even more after the introduction of “soft” verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from “hard” to “soft”, which results in much better results.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology &amp; Engineering / Engineering (General).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DGBA Backlist Complete English Language 2000-2014 PART1</subfield><subfield code="z">9783110238570</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DGBA Backlist Physical Sciences 2000-2014 (EN)</subfield><subfield code="z">9783110238518</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DGBA Physical Sciences 2000 - 2014</subfield><subfield code="z">9783110637212</subfield><subfield code="o">ZDB-23-GPS</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">eBook-Paket OWV  Elektrotechnik, Maschinenbau, Ingenieurswissenschaften 2013</subfield><subfield code="z">9783110342666</subfield><subfield code="o">ZDB-23-OEM</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783486752120</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1524/9783486781267</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783486781267</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783486781267/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-023851-8 DGBA Backlist Physical Sciences 2000-2014 (EN)</subfield><subfield code="c">2000</subfield><subfield code="d">2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-023857-0 DGBA Backlist Complete English Language 2000-2014 PART1</subfield><subfield code="c">2000</subfield><subfield code="d">2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-GPS</subfield><subfield code="c">2000</subfield><subfield code="d">2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-OEM</subfield><subfield code="b">2013</subfield></datafield></record></collection>