rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9789812381323

Coding Theory and Cryptology

by ;
  • ISBN13:

    9789812381323

  • ISBN10:

    9812381325

  • Format: Hardcover
  • Copyright: 2003-02-01
  • Publisher: World Scientific Pub Co Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $78.00
  • Digital
    $188.40*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security.

Table of Contents

Foreword
Preface
Extremal Problems of Coding Theoryp. 1
Analysis and Design Issues for Synchronous Stream Ciphersp. 49
Quantum Error-Correcting Codesp. 91
Public Key Infrastructuresp. 143
Computational Methods in Public Key Cryptologyp. 175
Detecting and Revoking Compromised Keysp. 239
Algebraic Function Fields Over Finite Fieldsp. 259
Authentication Schemesp. 283
Exponential Sums in Coding Theory, Cryptology and Algorithmsp. 323
Distributed Authorization: Principles and Practicep. 385
Introduction to Algebraic Geometry Codesp. 435
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program