Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Codes, Cryptology and Curves with Computer Algebra
  • Language: en
  • Pages: 611

Codes, Cryptology and Curves with Computer Algebra

Graduate-level introduction to error-correcting codes, which are used to protect digital data and applied in public key cryptosystems.

Algebraic Geometry Modeling in Information Theory
  • Language: en
  • Pages: 334

Algebraic Geometry Modeling in Information Theory

Algebraic & geometry methods have constituted a basic background and tool for people working on classic block coding theory and cryptography. Nowadays, new paradigms on coding theory and cryptography have arisen such as: Network coding, S-Boxes, APN Functions, Steganography and decoding by linear programming. Again understanding the underlying procedure and symmetry of these topics needs a whole bunch of non trivial knowledge of algebra and geometry that will be used to both, evaluate those methods and search for new codes and cryptographic applications. This book shows those methods in a self-contained form.

Topics in Galois Fields
  • Language: en
  • Pages: 785

Topics in Galois Fields

This monograph provides a self-contained presentation of the foundations of finite fields, including a detailed treatment of their algebraic closures. It also covers important advanced topics which are not yet found in textbooks: the primitive normal basis theorem, the existence of primitive elements in affine hyperplanes, and the Niederreiter method for factoring polynomials over finite fields. We give streamlined and/or clearer proofs for many fundamental results and treat some classical material in an innovative manner. In particular, we emphasize the interplay between arithmetical and structural results, and we introduce Berlekamp algebras in a novel way which provides a deeper understanding of Berlekamp's celebrated factorization algorithm. The book provides a thorough grounding in finite field theory for graduate students and researchers in mathematics. In view of its emphasis on applicable and computational aspects, it is also useful for readers working in information and communication engineering, for instance, in signal processing, coding theory, cryptography or computer science.

Topics in Finite Fields
  • Language: en
  • Pages: 386

Topics in Finite Fields

This volume contains the proceedings of the 11th International Conference on Finite Fields and their Applications (Fq11), held July 22-26, 2013, in Magdeburg, Germany. Finite Fields are fundamental structures in mathematics. They lead to interesting deep problems in number theory, play a major role in combinatorics and finite geometry, and have a vast amount of applications in computer science. Papers in this volume cover these aspects of finite fields as well as applications in coding theory and cryptography.

Constructions of New Matroids and Designs Over GF(q)
  • Language: en

Constructions of New Matroids and Designs Over GF(q)

  • Type: Book
  • -
  • Published: 2021
  • -
  • Publisher: Unknown

A perfect matroid design (PMD) is a matroid whose flats of the same rank all have the same size. In this paper we introduce the q-analogue of a PMD and its properties. In order to do so, we first establish a new cryptomorphic definition for q-matroids. We show that q-Steiner systems are examples of q-PMD's and we use this q-matroid structure to construct subspace designs from q-Steiner systems. We apply this construction to S(2, 3, 13; q) q-Steiner systems and hence establish the existence of subspace designs whose parameters had not before been realised.

Finite Fields and Their Applications
  • Language: en
  • Pages: 288

Finite Fields and Their Applications

This book is based on the invited talks of the "RICAM-Workshop on Finite Fields and Their Applications: Character Sums and Polynomials" held at the Federal Institute for Adult Education (BIfEB) in Strobl, Austria, from September 2-7, 2012. Finite fields play important roles in many application areas such as coding theory, cryptography, Monte Carlo and quasi-Monte Carlo methods, pseudorandom number generation, quantum computing, and wireless communication. In this book we will focus on sequences, character sums, and polynomials over finite fields in view of the above mentioned application areas: Chapters 1 and 2 deal with sequences mainly constructed via characters and analyzed using bounds o...

Matroid Applications
  • Language: en
  • Pages: 377

Matroid Applications

This volume, the third in a sequence that began with The Theory of Matroids and Combinatorial Geometries, concentrates on the applications of matroid theory to a variety of topics from engineering (rigidity and scene analysis), combinatorics (graphs, lattices, codes and designs), topology and operations research (the greedy algorithm).

Polynomial Methods and Incidence Theory
  • Language: en
  • Pages: 263

Polynomial Methods and Incidence Theory

A thorough yet accessible introduction to the mathematical breakthroughs achieved by using new polynomial methods in the past decade.

Matroids: A Geometric Introduction
  • Language: en
  • Pages: 411

Matroids: A Geometric Introduction

This friendly introduction helps undergraduate students understand and appreciate matroid theory and its connections to geometry.

Guide to Pairing-Based Cryptography
  • Language: en
  • Pages: 410

Guide to Pairing-Based Cryptography

  • Type: Book
  • -
  • Published: 2017-01-06
  • -
  • Publisher: CRC Press

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.