Coding Theory And Cryptology (inbunden)
Format
Inbunden (Hardback)
Språk
Engelska
Antal sidor
460
Utgivningsdatum
2002-12-01
Förlag
World Scientific Publishing Co Pte Ltd
Medarbetare
Singapore, University Press
Illustrationer
Illustrations
Dimensioner
238 x 155 x 29 mm
Vikt
772 g
Antal komponenter
1
ISBN
9789812381323
Coding Theory And Cryptology (inbunden)

Coding Theory And Cryptology

Inbunden Engelska, 2002-12-01
909
Skickas inom 5-8 vardagar.
Gratis frakt inom Sverige över 159 kr för privatpersoner.
Finns även som
Visa alla 3 format & utgåvor
The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security.
Visa hela texten

Passar bra ihop

  1. Coding Theory And Cryptology
  2. +
  3. How to Avoid a Climate Disaster

De som köpt den här boken har ofta också köpt How to Avoid a Climate Disaster av Bill Gates (inbunden).

Köp båda 2 för 1098 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Harald Niederreiter

Innehållsförteckning

Extremal Problems of Coding Theory (A Barg); Analysis and Design Issues for Synchronous Stream Ciphers (E Dawson & L Simpson); Quantum Error-Correcting Codes (K Feng); Public Key Infrastructures (D Gollmann); Computational Methods in Public Key Cryptology (A K Lenstra); Detecting and Revoking Compromised Keys (T Matsumoto); Algebraic Function Fields Over Finite Fields (H Niederreiter); Authentication Schemes (D Y Pei); Exponential Sums in Coding Theory, Cryptology and Algorithms (I E Shparlinski); Distributed Authorization: Principles and Practice (V Varadharajan); Introduction to Algebraic Geometry Codes (C P Xing).