Gröbner Bases, Coding, and Cryptography
Title | Gröbner Bases, Coding, and Cryptography PDF eBook |
Author | Massimiliano Sala |
Publisher | Springer Science & Business Media |
Pages | 428 |
Release | 2009-05-28 |
Genre | Mathematics |
ISBN | 3540938060 |
Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations. This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation.
Gröbner Bases and Applications
Title | Gröbner Bases and Applications PDF eBook |
Author | Bruno Buchberger |
Publisher | Cambridge University Press |
Pages | 566 |
Release | 1998-02-26 |
Genre | Mathematics |
ISBN | 9780521632980 |
Comprehensive account of theory and applications of Gröbner bases, co-edited by the subject's inventor.
Boolean Gröbner Bases
Title | Boolean Gröbner Bases PDF eBook |
Author | Michael Brickenstein |
Publisher | Logos Verlag Berlin GmbH |
Pages | 158 |
Release | 2010 |
Genre | Computers |
ISBN | 3832525971 |
There exist very few concepts in computational algebra which are as central to theory and applications as Grobner bases. This thesis describes theory, algorithms and applications for the special case of Boolean polynomials. These parts form the mathematical foundations of the PolyBoRi framework (developed by the author together with Alexander Dreyer). The PolyBoRi framework has applications spread over a large number of domains ranging from formal verification, computational biology to cryptanalysis and many more. It is emerged to a worldwide audience by the Sage computational algebra system.
Coding and Cryptography
Title | Coding and Cryptography PDF eBook |
Author | Øyvind Ytrehus |
Publisher | Springer Science & Business Media |
Pages | 452 |
Release | 2006-07-06 |
Genre | Computers |
ISBN | 3540354816 |
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.
Codes, Cryptology and Curves with Computer Algebra
Title | Codes, Cryptology and Curves with Computer Algebra PDF eBook |
Author | Ruud Pellikaan |
Publisher | Cambridge University Press |
Pages | 612 |
Release | 2017-11-02 |
Genre | Mathematics |
ISBN | 1108547826 |
This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Title | Applied Algebra, Algebraic Algorithms and Error-Correcting Codes PDF eBook |
Author | Maria Bras-Amorós |
Publisher | Springer Science & Business Media |
Pages | 253 |
Release | 2009-05-25 |
Genre | Computers |
ISBN | 3642021808 |
This book constitutes the refereed proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-18, held in Tarragona, Spain, in June 2009. The 22 revised full papers presented together with 7 extended absstracts were carefully reviewed and selected from 50 submissions. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.
Public Key Cryptography -- PKC 2012
Title | Public Key Cryptography -- PKC 2012 PDF eBook |
Author | Marc Fischlin |
Publisher | Springer |
Pages | 746 |
Release | 2012-05-19 |
Genre | Computers |
ISBN | 364230057X |
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.