메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Cryptcoding - Encryption and error-correction coding in a single step

Author keywords

Cryptography; Error correction; Secure document management

Indexed keywords

ENCRYPTION/DECRYPTION; ERROR-CORRECTING CODES; ERROR-CORRECTION CODING; GOPPA CODES; MCELIECE; PUBLIC-KEY ENCRYPTIONS; QUASIGROUP; SECURE DOCUMENT MANAGEMENT; SINGLE STEPS;

EID: 66149159128     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (24)
  • 1
    • 84856043672 scopus 로고
    • A Mathematical Theory of Communication
    • C.E. Shannon, A Mathematical Theory of Communication, Bell Sys. Tech. J., 27:379-423, 623-656, 1948.
    • (1948) Bell Sys. Tech. J , vol.27 , Issue.379-423 , pp. 623-656
    • Shannon, C.E.1
  • 2
    • 84943817322 scopus 로고
    • Error detecting and error correcting codes
    • R.W. Hamming, Error detecting and error correcting codes, Bell Sys. Tech. J., 29:147-60, 1950.
    • (1950) Bell Sys. Tech. J , vol.29 , pp. 147-160
    • Hamming, R.W.1
  • 3
    • 0346213336 scopus 로고
    • Some Applications of Coding Theory in Cryptography
    • Ed. P. G. Farrell, Essex, England: Formara Ltd
    • J.L. Massey, Some Applications of Coding Theory in Cryptography, in Codes and Cyphers: Cryptography and Coding IV (Ed. P. G. Farrell). Essex, England: Formara Ltd., 1995, pp. 33-47.
    • (1995) Codes and Cyphers: Cryptography and Coding IV , pp. 33-47
    • Massey, J.L.1
  • 4
    • 62349134902 scopus 로고    scopus 로고
    • National Science Foundation, April 17-18, availiable on
    • Report of the Working Group on Cryptology and Coding Theory, National Science Foundation, April 17-18, 1997, availiable on http://www.nsf.gov/pubs/1998/nsf9814/nsf9814.htm
    • (1997) Report of the Working Group on Cryptology and Coding Theory
  • 8
    • 36148998670 scopus 로고
    • Method and Apparatus for Credit Card Verification
    • U.S. Patent 5,321,751, June
    • L.A. Ray, R.N. Ellson, Method and Apparatus for Credit Card Verification, U.S. Patent 5,321,751, June 1994.
    • (1994)
    • Ray, L.A.1    Ellson, R.N.2
  • 10
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Y. Dodis, L. Reyzin, A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Eurocrypt 2004 LNCS 3027, pg. 523-540, 2004.
    • (2004) Eurocrypt 2004 LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 12
    • 62349119027 scopus 로고    scopus 로고
    • G. Di Crescenzo, R. Graveman, R. Ge, G. Arce, Approximate Message Authentication and Biometric Entity Authentication, Proc. 9th Int. Conf. Financial Cryptography and Data Security, FC2005, LNCS 3570.
    • G. Di Crescenzo, R. Graveman, R. Ge, G. Arce, Approximate Message Authentication and Biometric Entity Authentication, Proc. 9th Int. Conf. Financial Cryptography and Data Security, FC2005, LNCS 3570.
  • 14
    • 36148952455 scopus 로고    scopus 로고
    • Photo-image authentication by pattern recognition and cryptography
    • 96, Vienna, Aug
    • L. O'Gorman, I. Rabinovich, Photo-image authentication by pattern recognition and cryptography, Int. Conf. Pattern Recognition (ICPR '96), Vienna, Aug. 1996, pp. 949-953.
    • (1996) Int. Conf. Pattern Recognition (ICPR , pp. 949-953
    • O'Gorman, L.1    Rabinovich, I.2
  • 16
    • 0032180265 scopus 로고    scopus 로고
    • Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography
    • L. O'Gorman, I. Rabinovich, Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography, IEEE Trans. Pattern Anal. Mach. Intell. 20(10): 1097-1102 (1998)
    • (1998) IEEE Trans. Pattern Anal. Mach. Intell , vol.20 , Issue.10 , pp. 1097-1102
    • O'Gorman, L.1    Rabinovich, I.2
  • 18
    • 0027277304 scopus 로고
    • A Novel Image Coding Technique for Noisy Communications, Communications, Computers and Signal Processing, 1993
    • C. J. Kuo , C. S. Huang, A Novel Image Coding Technique for Noisy Communications, Communications, Computers and Signal Processing, 1993., IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, vol. 1, 1993, pp. 260-263.
    • (1993) IEEE Pacific Rim Conference on Communications, Computers and Signal Processing , vol.1 , pp. 260-263
    • Kuo, C.J.1    Huang, C.S.2
  • 21
    • 62349126562 scopus 로고    scopus 로고
    • Gligoroski, D., Markovski, S., Kocarev, L. Error-Correcting Codes Based on Quasigroups, Unpublished, Submitted to IEEE Information Theory, October 2005.
    • Gligoroski, D., Markovski, S., Kocarev, L. Error-Correcting Codes Based on Quasigroups, Unpublished, Submitted to IEEE Information Theory, October 2005.
  • 22
    • 62349092035 scopus 로고    scopus 로고
    • U.S. Provisional Patent Application Serial No. 60/618,173, filed October 13, 2004, under 35 U.S.C 119, now disclosed Cryptographic Primitives, Error Coding, and Pseudo-Random Number Improvement Methods Using Quasigroups
    • U.S. Provisional Patent Application Serial No. 60/618,173, filed October 13, 2004, under 35 U.S.C 119. (now disclosed) Cryptographic Primitives, Error Coding, and Pseudo-Random Number Improvement Methods Using Quasigroups.
  • 23
    • 62349122745 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/PDF417
  • 24
    • 62349093319 scopus 로고    scopus 로고
    • Microsoft technical overview, Counterfeit-Resistant Optical Fiber, http://www.microsoft.com/mscorp/ip/tech/opticalfiber.asp
    • Microsoft technical overview, Counterfeit-Resistant Optical Fiber, http://www.microsoft.com/mscorp/ip/tech/opticalfiber.asp


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.