0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Designs From Linear Codes (Hardcover, Second Edition): Cunsheng Ding, Chunming Tang Designs From Linear Codes (Hardcover, Second Edition)
Cunsheng Ding, Chunming Tang
R4,013 Discovery Miles 40 130 Ships in 18 - 22 working days

Since the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson theorem for linear codes over finite fields has been developed, two 70-year breakthroughs and a considerable amount of other progress on t-designs from linear codes have been made. This second edition is a substantial revision and expansion of the first edition. Two new chapters and two new appendices have been added, and most chapters of the first edition have been revised.It provides a well-rounded and detailed account of t-designs from linear codes. Most chapters of this book cover the support designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, special functions, linear codes and designs are also investigated. This book consists of both classical and recent results on designs from linear codes.It is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry. It can also be used as a textbook for postgraduates in these subject areas.Related Link(s)

Stream Ciphers and Number Theory, Volume 66 (Hardcover, Revised edition): Thomas W Cusick, Cunsheng Ding, Ari R Renvall Stream Ciphers and Number Theory, Volume 66 (Hardcover, Revised edition)
Thomas W Cusick, Cunsheng Ding, Ari R Renvall
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields.
.Unique book on interactions of stream ciphers and number theory.
.Research monograph with many results not available elsewhere.
.A revised edition with the most recent advances in this subject.
.Over thirty research problems for stimulating interactions between the two areas.
.Written by leading researchers in stream ciphers and number theory.

Designs From Linear Codes (Hardcover): Cunsheng Ding Designs From Linear Codes (Hardcover)
Cunsheng Ding
R3,986 Discovery Miles 39 860 Ships in 18 - 22 working days

This monograph aims to provide a well-rounded and detailed account of designs using linear codes. Most chapters of this monograph cover on the designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, linear codes and designs are also investigated. This book consists of both classical results on designs from linear codes and recent results yet published by others.This monograph is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry.

Codes From Difference Sets (Hardcover): Cunsheng Ding Codes From Difference Sets (Hardcover)
Cunsheng Ding
R3,164 Discovery Miles 31 640 Ships in 18 - 22 working days

This is the first monograph on codebooks and linear codes from difference sets and almost difference sets. It aims at providing a survey of constructions of difference sets and almost difference sets as well as an in-depth treatment of codebooks and linear codes from difference sets and almost difference sets. To be self-contained, this monograph covers necessary mathematical foundations and the basics of coding theory. It also contains tables of best BCH codes and best cyclic codes over GF(2) and GF(3) up to length 125 and 79, respectively. This repository of tables can be used to benchmark newly constructed cyclic codes. This monograph is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications.

Chinese Remainder Theorem: Applications In Computing, Coding, Cryptography (Hardcover): Dingyi Pei, Arto Salomaa, Cunsheng Ding Chinese Remainder Theorem: Applications In Computing, Coding, Cryptography (Hardcover)
Dingyi Pei, Arto Salomaa, Cunsheng Ding
R2,444 Discovery Miles 24 440 Ships in 18 - 22 working days

Chinese Remainder Theorem, CRT, is one of the jewels of mathematics. It is a perfect combination of beauty and utility or, in the words of Horace, omne tulit punctum qui miscuit utile dulci. Known already for ages, CRT continues to present itself in new contexts and open vistas for new types of applications. So far, its usefulness has been obvious within the realm of "three C's". Computing was its original field of application, and continues to be important as regards various aspects of algorithmics and modular computations. Theory of codes and cryptography are two more recent fields of application.This book tells about CRT, its background and philosophy, history, generalizations and, most importantly, its applications. The book is self-contained. This means that no factual knowledge is assumed on the part of the reader. We even provide brief tutorials on relevant subjects, algebra and information theory. However, some mathematical maturity is surely a prerequisite, as our presentation is at an advanced undergraduate or beginning graduate level. We have tried to make the exposition innovative, many of the individual results being new. We will return to this matter, as well as to the interdependence of the various parts of the book, at the end of the Introduction.A special course about CRT can be based on the book. The individual chapters are largely independent and, consequently, the book can be used as supplementary material for courses in algorithmics, coding theory, cryptography or theory of computing. Of course, the book is also a reference for matters dealing with CRT.

Progress in Cryptology - INDOCRYPT 2001 - Second International Conference on Cryptology in India, Chennai, India, December... Progress in Cryptology - INDOCRYPT 2001 - Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 (Paperback, 2001 ed.)
C. Pandu Rangan, Cunsheng Ding
R1,427 Discovery Miles 14 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference in Cryptology in India, INDOCRYPT 2001, held in Chennai, India in December 2001. The 31 revised full papers presented together with an invited survey were carefully reviewed and selected from 77 submissions. The papers are organized in topical sections on hashing, algebraic schemes, elliptic curves, coding theory, applications, cryptanalysis, distributed cryptography, Boolean functions, digitial signatures, and shift registers.

The Stability Theory of Stream Ciphers (Paperback, 1991 ed.): Cunsheng Ding, Guozhen Xiao, Weijuan Shan The Stability Theory of Stream Ciphers (Paperback, 1991 ed.)
Cunsheng Ding, Guozhen Xiao, Weijuan Shan
R1,443 Discovery Miles 14 430 Ships in 18 - 22 working days

Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Morphogenesis Deconstructed - An…
Len Pismen Hardcover R2,200 Discovery Miles 22 000
What A Ship Sees - A Fold-out Journey…
Laura Knowles Hardcover R386 Discovery Miles 3 860
Indestructibles: The Wheels on the Bus…
Vanja Kragulj Paperback R135 R121 Discovery Miles 1 210
Tractor coloring book for kids 4-8 - A…
Little Boys Publishing Hardcover R589 R543 Discovery Miles 5 430
Riding To School On Mr. Cee's Bus
Carluse Baird Hardcover R548 Discovery Miles 5 480
From Boolean Logic to Switching Circuits…
Radomir S Stankovic, Jaakko Astola Hardcover R4,687 Discovery Miles 46 870
Memristor Technology: Synthesis and…
Heba Abunahla, Baker Mohammad Hardcover R2,641 Discovery Miles 26 410
Wreck the Halls
Melinda L Rathjen Hardcover R193 Discovery Miles 1 930
See MIPS Run
Dominic Sweetman Paperback R1,680 Discovery Miles 16 800
Simplified Design of Data Converters
John Lenk Paperback R1,163 Discovery Miles 11 630

 

Partners