Chapter
Licensed
Unlicensed
Requires Authentication
9. Applications of Soft Input Soft Verification
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter I
- Abstract V
- Table of Contents VII
- 1. Introduction 1
- 2. Fundamentals 5
- 3. Related Work 27
- 4. Soft Input Hard Verification 33
- 5. Applications of Soft Input Bit Inversion 47
- 6. Soft Verification of the Message Authentication Codes 61
- 7. Security Aspects of Soft Input Soft Verification 89
- 8. Soft Output of Soft Input Soft Verification 109
- 9. Applications of Soft Input Soft Verification 113
- 10. Summary and Future Work 115
- Epilogue 117
- Works Cited 119
- List of Abbreviations 125
Chapters in this book
- Frontmatter I
- Abstract V
- Table of Contents VII
- 1. Introduction 1
- 2. Fundamentals 5
- 3. Related Work 27
- 4. Soft Input Hard Verification 33
- 5. Applications of Soft Input Bit Inversion 47
- 6. Soft Verification of the Message Authentication Codes 61
- 7. Security Aspects of Soft Input Soft Verification 89
- 8. Soft Output of Soft Input Soft Verification 109
- 9. Applications of Soft Input Soft Verification 113
- 10. Summary and Future Work 115
- Epilogue 117
- Works Cited 119
- List of Abbreviations 125