Coding and Cryptography : : Synergy for a Robust Communication / / Natasa Zivic.
This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integrat...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Berlin ;, Boston : : Oldenbourg Wissenschaftsverlag, , [2013] ©2013 |
Year of Publication: | 2013 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (126 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9783486781267 |
---|---|
lccn |
2014395121 |
ctrlnum |
(DE-B1597)219848 (OCoLC)900720586 |
collection |
bib_alma |
record_format |
marc |
spelling |
Zivic, Natasa, author. aut http://id.loc.gov/vocabulary/relators/aut Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic. Berlin ; Boston : Oldenbourg Wissenschaftsverlag, [2013] ©2013 1 online resource (126 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Abstract -- Table of Contents -- 1. Introduction -- 2. Fundamentals -- 3. Related Work -- 4. Soft Input Hard Verification -- 5. Applications of Soft Input Bit Inversion -- 6. Soft Verification of the Message Authentication Codes -- 7. Security Aspects of Soft Input Soft Verification -- 8. Soft Output of Soft Input Soft Verification -- 9. Applications of Soft Input Soft Verification -- 10. Summary and Future Work -- Epilogue -- Works Cited -- List of Abbreviations restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or “hard” verification, but even more after the introduction of “soft” verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from “hard” to “soft”, which results in much better results. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022) Coding theory. Cryptography. Technology & Engineering / Engineering (General). bisacsh Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1 9783110238570 Title is part of eBook package: De Gruyter DGBA Backlist Physical Sciences 2000-2014 (EN) 9783110238518 Title is part of eBook package: De Gruyter DGBA Physical Sciences 2000 - 2014 9783110637212 ZDB-23-GPS Title is part of eBook package: De Gruyter eBook-Paket OWV Elektrotechnik, Maschinenbau, Ingenieurswissenschaften 2013 9783110342666 ZDB-23-OEM print 9783486752120 https://doi.org/10.1524/9783486781267 https://www.degruyter.com/isbn/9783486781267 Cover https://www.degruyter.com/document/cover/isbn/9783486781267/original |
language |
English |
format |
eBook |
author |
Zivic, Natasa, Zivic, Natasa, |
spellingShingle |
Zivic, Natasa, Zivic, Natasa, Coding and Cryptography : Synergy for a Robust Communication / Frontmatter -- Abstract -- Table of Contents -- 1. Introduction -- 2. Fundamentals -- 3. Related Work -- 4. Soft Input Hard Verification -- 5. Applications of Soft Input Bit Inversion -- 6. Soft Verification of the Message Authentication Codes -- 7. Security Aspects of Soft Input Soft Verification -- 8. Soft Output of Soft Input Soft Verification -- 9. Applications of Soft Input Soft Verification -- 10. Summary and Future Work -- Epilogue -- Works Cited -- List of Abbreviations |
author_facet |
Zivic, Natasa, Zivic, Natasa, |
author_variant |
n z nz n z nz |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Zivic, Natasa, |
title |
Coding and Cryptography : Synergy for a Robust Communication / |
title_sub |
Synergy for a Robust Communication / |
title_full |
Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic. |
title_fullStr |
Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic. |
title_full_unstemmed |
Coding and Cryptography : Synergy for a Robust Communication / Natasa Zivic. |
title_auth |
Coding and Cryptography : Synergy for a Robust Communication / |
title_alt |
Frontmatter -- Abstract -- Table of Contents -- 1. Introduction -- 2. Fundamentals -- 3. Related Work -- 4. Soft Input Hard Verification -- 5. Applications of Soft Input Bit Inversion -- 6. Soft Verification of the Message Authentication Codes -- 7. Security Aspects of Soft Input Soft Verification -- 8. Soft Output of Soft Input Soft Verification -- 9. Applications of Soft Input Soft Verification -- 10. Summary and Future Work -- Epilogue -- Works Cited -- List of Abbreviations |
title_new |
Coding and Cryptography : |
title_sort |
coding and cryptography : synergy for a robust communication / |
publisher |
Oldenbourg Wissenschaftsverlag, |
publishDate |
2013 |
physical |
1 online resource (126 p.) |
contents |
Frontmatter -- Abstract -- Table of Contents -- 1. Introduction -- 2. Fundamentals -- 3. Related Work -- 4. Soft Input Hard Verification -- 5. Applications of Soft Input Bit Inversion -- 6. Soft Verification of the Message Authentication Codes -- 7. Security Aspects of Soft Input Soft Verification -- 8. Soft Output of Soft Input Soft Verification -- 9. Applications of Soft Input Soft Verification -- 10. Summary and Future Work -- Epilogue -- Works Cited -- List of Abbreviations |
isbn |
9783486781267 9783110238570 9783110238518 9783110637212 9783110342666 9783486752120 |
callnumber-first |
M - Music |
callnumber-label |
MLCM 2018/49888 (Q) |
callnumber-sort |
MLCM 42018 549888 Q |
url |
https://doi.org/10.1524/9783486781267 https://www.degruyter.com/isbn/9783486781267 https://www.degruyter.com/document/cover/isbn/9783486781267/original |
illustrated |
Not Illustrated |
dewey-hundreds |
600 - Technology |
dewey-tens |
620 - Engineering |
dewey-ones |
621 - Applied physics |
dewey-full |
621.3 |
dewey-sort |
3621.3 |
dewey-raw |
621.3 |
dewey-search |
621.3 |
doi_str_mv |
10.1524/9783486781267 |
oclc_num |
900720586 |
work_keys_str_mv |
AT zivicnatasa codingandcryptographysynergyforarobustcommunication |
status_str |
n |
ids_txt_mv |
(DE-B1597)219848 (OCoLC)900720586 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1 Title is part of eBook package: De Gruyter DGBA Backlist Physical Sciences 2000-2014 (EN) Title is part of eBook package: De Gruyter DGBA Physical Sciences 2000 - 2014 Title is part of eBook package: De Gruyter eBook-Paket OWV Elektrotechnik, Maschinenbau, Ingenieurswissenschaften 2013 |
is_hierarchy_title |
Coding and Cryptography : Synergy for a Robust Communication / |
container_title |
Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1 |
_version_ |
1806145673459924992 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04758nam a22007935i 4500</leader><controlfield tag="001">9783486781267</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220424125308.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220424t20132013gw fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2014395121</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013940329</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783486781267</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1524/9783486781267</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)219848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900720586</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">MLCM 2018/49888 (Q)</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA268</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC009000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">621.3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6045</subfield><subfield code="2">rvk</subfield><subfield code="0">(DE-625)rvk/157497:</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zivic, Natasa, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coding and Cryptography :</subfield><subfield code="b">Synergy for a Robust Communication /</subfield><subfield code="c">Natasa Zivic.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">Oldenbourg Wissenschaftsverlag, </subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (126 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Abstract -- </subfield><subfield code="t">Table of Contents -- </subfield><subfield code="t">1. Introduction -- </subfield><subfield code="t">2. Fundamentals -- </subfield><subfield code="t">3. Related Work -- </subfield><subfield code="t">4. Soft Input Hard Verification -- </subfield><subfield code="t">5. Applications of Soft Input Bit Inversion -- </subfield><subfield code="t">6. Soft Verification of the Message Authentication Codes -- </subfield><subfield code="t">7. Security Aspects of Soft Input Soft Verification -- </subfield><subfield code="t">8. Soft Output of Soft Input Soft Verification -- </subfield><subfield code="t">9. Applications of Soft Input Soft Verification -- </subfield><subfield code="t">10. Summary and Future Work -- </subfield><subfield code="t">Epilogue -- </subfield><subfield code="t">Works Cited -- </subfield><subfield code="t">List of Abbreviations</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or “hard” verification, but even more after the introduction of “soft” verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from “hard” to “soft”, which results in much better results.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology & Engineering / Engineering (General).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DGBA Backlist Complete English Language 2000-2014 PART1</subfield><subfield code="z">9783110238570</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DGBA Backlist Physical Sciences 2000-2014 (EN)</subfield><subfield code="z">9783110238518</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DGBA Physical Sciences 2000 - 2014</subfield><subfield code="z">9783110637212</subfield><subfield code="o">ZDB-23-GPS</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">eBook-Paket OWV Elektrotechnik, Maschinenbau, Ingenieurswissenschaften 2013</subfield><subfield code="z">9783110342666</subfield><subfield code="o">ZDB-23-OEM</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783486752120</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1524/9783486781267</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783486781267</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783486781267/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-023851-8 DGBA Backlist Physical Sciences 2000-2014 (EN)</subfield><subfield code="c">2000</subfield><subfield code="d">2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-023857-0 DGBA Backlist Complete English Language 2000-2014 PART1</subfield><subfield code="c">2000</subfield><subfield code="d">2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-GPS</subfield><subfield code="c">2000</subfield><subfield code="d">2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-OEM</subfield><subfield code="b">2013</subfield></datafield></record></collection> |