Author:
Publisher:
ISBN: 9814475351
Category :
Languages : en
Pages :
Book Description
Advances in Coding Theory and Cryptography
Advances in Coding Theory and Crytography
Author: Tanush Shaska
Publisher: World Scientific Publishing Company Incorporated
ISBN: 9789812707017
Category : Computers
Languages : en
Pages : 256
Book Description
In the new era of technology and advanced communications, coding theory and cryptography play a particularly significant role with a huge amount of research being done in both areas. This book presents some of that research, authored by prominent experts in the field. The first part of the book covers error-correcting codes, automorphism groups of codes, the key equation for codes from order domains, codes over rings, theta functions of certain codes, etc; the second part contains articles on cryptography — small dimensional varieties, Jacobians of curves, theta functions of hyperelliptic curves, elliptic curve cryptography, and so on.The list of well-known authors includes J Little, R Scheidler, A Stein, V Ustimenko, D Joyner, T Shaska, M J Jacobson, M E O'Sulivan, A Ksir, W Travis, M Borges-Quintana, M A Borges-Trenard, E Martinez-Moro, C Shor, I G Bouyukliev, T Ward, J L Kim, X D Hou, et al.
Publisher: World Scientific Publishing Company Incorporated
ISBN: 9789812707017
Category : Computers
Languages : en
Pages : 256
Book Description
In the new era of technology and advanced communications, coding theory and cryptography play a particularly significant role with a huge amount of research being done in both areas. This book presents some of that research, authored by prominent experts in the field. The first part of the book covers error-correcting codes, automorphism groups of codes, the key equation for codes from order domains, codes over rings, theta functions of certain codes, etc; the second part contains articles on cryptography — small dimensional varieties, Jacobians of curves, theta functions of hyperelliptic curves, elliptic curve cryptography, and so on.The list of well-known authors includes J Little, R Scheidler, A Stein, V Ustimenko, D Joyner, T Shaska, M J Jacobson, M E O'Sulivan, A Ksir, W Travis, M Borges-Quintana, M A Borges-Trenard, E Martinez-Moro, C Shor, I G Bouyukliev, T Ward, J L Kim, X D Hou, et al.
Coding Theory and Cryptology
Author: Harald Niederreiter
Publisher: World Scientific
ISBN: 981448766X
Category : Mathematics
Languages : en
Pages : 460
Book Description
The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security. Contents:Extremal Problems of Coding Theory (A Barg)Analysis and Design Issues for Synchronous Stream Ciphers (E Dawson & L Simpson)Quantum Error-Correcting Codes (K Feng)Public Key Infrastructures (D Gollmann)Computational Methods in Public Key Cryptology (A K Lenstra)Detecting and Revoking Compromised Keys (T Matsumoto)Algebraic Function Fields Over Finite Fields (H Niederreiter)Authentication Schemes (D Y Pei)Exponential Sums in Coding Theory, Cryptology and Algorithms (I E Shparlinski)Distributed Authorization: Principles and Practice (V Varadharajan)Introduction to Algebraic Geometry Codes (C P Xing) Readership: Graduate students and researchers in number theory, discrete mathematics, coding theory, cryptology and IT security. Keywords:Coding Theory;Cryptology;Number Theory;Algebraic-Geometry Codes;Public-Key Infrastructures;Error-Correcting Codes
Publisher: World Scientific
ISBN: 981448766X
Category : Mathematics
Languages : en
Pages : 460
Book Description
The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security. Contents:Extremal Problems of Coding Theory (A Barg)Analysis and Design Issues for Synchronous Stream Ciphers (E Dawson & L Simpson)Quantum Error-Correcting Codes (K Feng)Public Key Infrastructures (D Gollmann)Computational Methods in Public Key Cryptology (A K Lenstra)Detecting and Revoking Compromised Keys (T Matsumoto)Algebraic Function Fields Over Finite Fields (H Niederreiter)Authentication Schemes (D Y Pei)Exponential Sums in Coding Theory, Cryptology and Algorithms (I E Shparlinski)Distributed Authorization: Principles and Practice (V Varadharajan)Introduction to Algebraic Geometry Codes (C P Xing) Readership: Graduate students and researchers in number theory, discrete mathematics, coding theory, cryptology and IT security. Keywords:Coding Theory;Cryptology;Number Theory;Algebraic-Geometry Codes;Public-Key Infrastructures;Error-Correcting Codes
Algebraic Geometry in Coding Theory and Cryptography
Author: Harald Niederreiter
Publisher: Princeton University Press
ISBN: 140083130X
Category : Mathematics
Languages : en
Pages : 272
Book Description
This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books
Publisher: Princeton University Press
ISBN: 140083130X
Category : Mathematics
Languages : en
Pages : 272
Book Description
This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books
Coding Theory and Cryptography
Author: David Joyner
Publisher: Springer Science & Business Media
ISBN: 3642596630
Category : Mathematics
Languages : en
Pages : 264
Book Description
These are the proceedings of the Conference on Coding Theory, Cryptography, and Number Theory held at the U. S. Naval Academy during October 25-26, 1998. This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. Some of these papers are expository, whereas others are the result of original research. The emphasis is on geometric Goppa codes (Shokrollahi, Shokranian-Joyner), but there is also a paper on codes arising from combinatorial constructions (Michael). There are both, historical and mathematical papers on cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers (Hamer, Hilton, Tutte, Weierud, Urling). Some mathematical aspects of the Enigma rotor machine (Sherman) and more recent research on quantum cryptography (Lomonoco) are described. There are two papers concerned with the RSA cryptosystem and related number-theoretic issues (Wardlaw, Cosgrave).
Publisher: Springer Science & Business Media
ISBN: 3642596630
Category : Mathematics
Languages : en
Pages : 264
Book Description
These are the proceedings of the Conference on Coding Theory, Cryptography, and Number Theory held at the U. S. Naval Academy during October 25-26, 1998. This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. Some of these papers are expository, whereas others are the result of original research. The emphasis is on geometric Goppa codes (Shokrollahi, Shokranian-Joyner), but there is also a paper on codes arising from combinatorial constructions (Michael). There are both, historical and mathematical papers on cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers (Hamer, Hilton, Tutte, Weierud, Urling). Some mathematical aspects of the Enigma rotor machine (Sherman) and more recent research on quantum cryptography (Lomonoco) are described. There are two papers concerned with the RSA cryptosystem and related number-theoretic issues (Wardlaw, Cosgrave).
Coding Theory
Author: Sudhakar Radhakrishnan
Publisher: BoD – Books on Demand
ISBN: 1839694092
Category : Computers
Languages : en
Pages : 142
Book Description
This book explores the latest developments, methods, approaches, and applications of coding theory in a wide variety of fields and endeavors. It consists of seven chapters that address such topics as applications of coding theory in networking and cryptography, wireless sensor nodes in wireless body area networks, the construction of linear codes, and more.
Publisher: BoD – Books on Demand
ISBN: 1839694092
Category : Computers
Languages : en
Pages : 142
Book Description
This book explores the latest developments, methods, approaches, and applications of coding theory in a wide variety of fields and endeavors. It consists of seven chapters that address such topics as applications of coding theory in networking and cryptography, wireless sensor nodes in wireless body area networks, the construction of linear codes, and more.
Coding and Cryptography
Author: Øyvind Ytrehus
Publisher: Springer Science & Business Media
ISBN: 3540354816
Category : Computers
Languages : en
Pages : 452
Book Description
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.
Publisher: Springer Science & Business Media
ISBN: 3540354816
Category : Computers
Languages : en
Pages : 452
Book Description
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.
Selected Topics in Information and Coding Theory
Recent Advances in Cryptography and Network Security
Author: Pinaki Mitra
Publisher: BoD – Books on Demand
ISBN: 1789843456
Category : Computers
Languages : en
Pages : 70
Book Description
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.
Publisher: BoD – Books on Demand
ISBN: 1789843456
Category : Computers
Languages : en
Pages : 70
Book Description
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.