|
Showing 1 - 6 of
6 matches in All Departments
Chapter 1: Introduction and Overview
The theory of finite fields, whose origins can be traced back to
the works of Gauss and Galois, has played a part in various
branches of mathematics, in recent years there has been a
resurgence of interest in finite fields, and this is partly due to
important applications in coding theory and cryptography.
Applications of Finite Fields introduces some of these recent
developments. This book focuses attention on some specific recent
developments in the theory and applications of finite fields. While
the topics selected are treated in some depth, Applications of
Finite Fields does not attempt to be encyclopedic. Among the topics
studied are different methods of representing the elements of a
finite field (including normal bases and optimal normal bases),
algorithms for factoring polynomials over finite fields, methods
for constructing irreducible polynomials, the discrete logarithm
problem and its implications to cryptography, the use of elliptic
curves in constructing public key cryptosystems, and the uses of
algebraic geometry in constructing good error-correcting codes.
This book is developed from a seminar held at the University of
Waterloo. The purpose of the seminar was to bridge the knowledge of
the participants whose expertise and interests ranged from the
purely theoretical to the applied. As a result, this book will be
of interest to a wide range of students, researchers and
practitioners in the disciplines of computer science, engineering
and mathematics. Applications of Finite Fields is an excellent
reference and may be used as a text for a course on the subject.
5. 2 Rings and Ideals 148 5. 3 Ideals and Cyclic Subspaces 152 5. 4
Generator Matrices and Parity-Check Matrices 159 5. 5 Encoding
Cyclic Codest 163 5. 6 Syndromes and Simple Decoding Procedures 168
5. 7 Burst Error Correcting 175 5. 8 Finite Fields and Factoring
xn-l over GF(q) 181 5. 9 Another Method for Factoring xn-l over
GF(q)t 187 5. 10 Exercises 193 Chapter 6 BCH Codes and Bounds for
Cyclic Codes 6. 1 Introduction 201 6. 2 BCH Codes and the BCH Bound
205 6. 3 Bounds for Cyclic Codest 210 6. 4 Decoding BCH Codes 215
6. 5 Linearized Polynomials and Finding Roots of Polynomialst 224
6. 6 Exercises 231 Chapter 7 Error Correction Techniques and
Digital Audio Recording 7. 1 Introduction 237 7. 2 Reed-Solomon
Codes 237 7. 3 Channel Erasures 240 7. 4 BCH Decoding with Erasures
244 7. 5 Interleaving 250 7. 6 Error Correction and Digital Audio
Recording 256 7.
5. 2 Rings and Ideals 148 5. 3 Ideals and Cyclic Subspaces 152 5. 4
Generator Matrices and Parity-Check Matrices 159 5. 5 Encoding
Cyclic Codest 163 5. 6 Syndromes and Simple Decoding Procedures 168
5. 7 Burst Error Correcting 175 5. 8 Finite Fields and Factoring
xn-l over GF(q) 181 5. 9 Another Method for Factoring xn-l over
GF(q)t 187 5. 10 Exercises 193 Chapter 6 BCH Codes and Bounds for
Cyclic Codes 6. 1 Introduction 201 6. 2 BCH Codes and the BCH Bound
205 6. 3 Bounds for Cyclic Codest 210 6. 4 Decoding BCH Codes 215
6. 5 Linearized Polynomials and Finding Roots of Polynomialst 224
6. 6 Exercises 231 Chapter 7 Error Correction Techniques and
Digital Audio Recording 7. 1 Introduction 237 7. 2 Reed-Solomon
Codes 237 7. 3 Channel Erasures 240 7. 4 BCH Decoding with Erasures
244 7. 5 Interleaving 250 7. 6 Error Correction and Digital Audio
Recording 256 7.
Crypto '90 marked the tenth anniversary of the Crypto conferences
held at the University of California at Santa Barbara. The
conference was held from August 11 to August 15, 1990 and was
sponsored by the International Association for Cryptologic
Research, in cooperation with the IEEE Computer Society Technical
Committee on Security and Privacy and the Department of Computer
Science of the University of California at Santa Barbara. 227
participants from twenty countries around the world. Crypto '90
attracted Roughly 35% of attendees were from academia, 45% from
industry and 20% from government. The program was intended to
provide a balance between the purely theoretical and the purely
practical aspects of cryptography to meet the needs and diversified
interests of these various groups. The overall organization of the
conference was superbly handled by the general chairperson Sherry
McMahan. All of the outstanding features of Crypto, which we have
come to expect over the years, were again present and, in addition
to all of this, she did a magnificent job in the preparation of the
book of abstracts. This is a crucial part of the program and we owe
her a great deal of thanks.
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional:
|
|