|
Showing 1 - 6 of
6 matches in All Departments
Selected Areas in Cryptography brings together in one place
important contributions and up-to-date research results in this
fast moving area. Selected Areas in Cryptography serves as an
excellent reference, providing insight into some of the most
challenging research issues in the field.
5. 2 Rings and Ideals 148 5. 3 Ideals and Cyclic Subspaces 152 5. 4
Generator Matrices and Parity-Check Matrices 159 5. 5 Encoding
Cyclic Codest 163 5. 6 Syndromes and Simple Decoding Procedures 168
5. 7 Burst Error Correcting 175 5. 8 Finite Fields and Factoring
xn-l over GF(q) 181 5. 9 Another Method for Factoring xn-l over
GF(q)t 187 5. 10 Exercises 193 Chapter 6 BCH Codes and Bounds for
Cyclic Codes 6. 1 Introduction 201 6. 2 BCH Codes and the BCH Bound
205 6. 3 Bounds for Cyclic Codest 210 6. 4 Decoding BCH Codes 215
6. 5 Linearized Polynomials and Finding Roots of Polynomialst 224
6. 6 Exercises 231 Chapter 7 Error Correction Techniques and
Digital Audio Recording 7. 1 Introduction 237 7. 2 Reed-Solomon
Codes 237 7. 3 Channel Erasures 240 7. 4 BCH Decoding with Erasures
244 7. 5 Interleaving 250 7. 6 Error Correction and Digital Audio
Recording 256 7.
Selected Areas in Cryptography brings together in one place
important contributions and up-to-date research results in this
fast moving area. Selected Areas in Cryptography serves as an
excellent reference, providing insight into some of the most
challenging research issues in the field.
5. 2 Rings and Ideals 148 5. 3 Ideals and Cyclic Subspaces 152 5. 4
Generator Matrices and Parity-Check Matrices 159 5. 5 Encoding
Cyclic Codest 163 5. 6 Syndromes and Simple Decoding Procedures 168
5. 7 Burst Error Correcting 175 5. 8 Finite Fields and Factoring
xn-l over GF(q) 181 5. 9 Another Method for Factoring xn-l over
GF(q)t 187 5. 10 Exercises 193 Chapter 6 BCH Codes and Bounds for
Cyclic Codes 6. 1 Introduction 201 6. 2 BCH Codes and the BCH Bound
205 6. 3 Bounds for Cyclic Codest 210 6. 4 Decoding BCH Codes 215
6. 5 Linearized Polynomials and Finding Roots of Polynomialst 224
6. 6 Exercises 231 Chapter 7 Error Correction Techniques and
Digital Audio Recording 7. 1 Introduction 237 7. 2 Reed-Solomon
Codes 237 7. 3 Channel Erasures 240 7. 4 BCH Decoding with Erasures
244 7. 5 Interleaving 250 7. 6 Error Correction and Digital Audio
Recording 256 7.
This book provides a concise yet comprehensive overview of computer
and Internet security, suitable for a one-term introductory course
for junior/senior undergrad or first-year graduate students. It is
also suitable for self-study by anyone seeking a solid footing in
security - including software developers and computing
professionals, technical managers and government staff. An
overriding focus is on brevity, without sacrificing breadth of core
topics or technical detail within them. The aim is to enable a
broad understanding in roughly 350 pages. Further prioritization is
supported by designating as optional selected content within this.
Fundamental academic concepts are reinforced by specifics and
examples, and related to applied problems and real-world incidents.
The first chapter provides a gentle overview and 20 design
principles for security. The ten chapters that follow provide a
framework for understanding computer and Internet security. They
regularly refer back to the principles, with supporting examples.
These principles are the conceptual counterparts of
security-related error patterns that have been recurring in
software and system designs for over 50 years. The book is
"elementary" in that it assumes no background in security, but
unlike "soft" high-level texts it does not avoid low-level details,
instead it selectively dives into fine points for exemplary topics
to concretely illustrate concepts and principles. The book is
rigorous in the sense of being technically sound, but avoids both
mathematical proofs and lengthy source-code examples that typically
make books inaccessible to general audiences. Knowledge of
elementary operating system and networking concepts is helpful, but
review sections summarize the essential background. For graduate
students, inline exercises and supplemental references provided in
per-chapter endnotes provide a bridge to further topics and a
springboard to the research literature; for those in industry and
government, pointers are provided to helpful surveys and relevant
standards, e.g., documents from the Internet Engineering Task Force
(IETF), and the U.S. National Institute of Standards and
Technology.
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional:
|
|