Coding Theory and Cryptology

Coding Theory and Cryptology

by Harald Niederreiter
     
 

ISBN-10: 9812384502

ISBN-13: 9789812384508

Pub. Date: 12/01/2002

Publisher: World Scientific Publishing Company, Incorporated

The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of…  See more details below

Overview

The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security.

Product Details

ISBN-13:
9789812384508
Publisher:
World Scientific Publishing Company, Incorporated
Publication date:
12/01/2002
Pages:
460
Product dimensions:
6.00(w) x 8.90(h) x 1.00(d)

Table of Contents

Foreword
Preface
Extremal Problems of Coding Theory1
Analysis and Design Issues for Synchronous Stream Ciphers49
Quantum Error-Correcting Codes91
Public Key Infrastructures143
Computational Methods in Public Key Cryptology175
Detecting and Revoking Compromised Keys239
Algebraic Function Fields Over Finite Fields259
Authentication Schemes283
Exponential Sums in Coding Theory, Cryptology and Algorithms323
Distributed Authorization: Principles and Practice385
Introduction to Algebraic Geometry Codes435

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >