Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
Chapter 1: Introduction and Overview
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches of mathematics, in recent years there has been a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. Applications of Finite Fields introduces some of these recent developments. This book focuses attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, Applications of Finite Fields does not attempt to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good error-correcting codes. This book is developed from a seminar held at the University of Waterloo. The purpose of the seminar was to bridge the knowledge of the participants whose expertise and interests ranged from the purely theoretical to the applied. As a result, this book will be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. Applications of Finite Fields is an excellent reference and may be used as a text for a course on the subject.
5. 2 Rings and Ideals 148 5. 3 Ideals and Cyclic Subspaces 152 5. 4 Generator Matrices and Parity-Check Matrices 159 5. 5 Encoding Cyclic Codest 163 5. 6 Syndromes and Simple Decoding Procedures 168 5. 7 Burst Error Correcting 175 5. 8 Finite Fields and Factoring xn-l over GF(q) 181 5. 9 Another Method for Factoring xn-l over GF(q)t 187 5. 10 Exercises 193 Chapter 6 BCH Codes and Bounds for Cyclic Codes 6. 1 Introduction 201 6. 2 BCH Codes and the BCH Bound 205 6. 3 Bounds for Cyclic Codest 210 6. 4 Decoding BCH Codes 215 6. 5 Linearized Polynomials and Finding Roots of Polynomialst 224 6. 6 Exercises 231 Chapter 7 Error Correction Techniques and Digital Audio Recording 7. 1 Introduction 237 7. 2 Reed-Solomon Codes 237 7. 3 Channel Erasures 240 7. 4 BCH Decoding with Erasures 244 7. 5 Interleaving 250 7. 6 Error Correction and Digital Audio Recording 256 7.
5. 2 Rings and Ideals 148 5. 3 Ideals and Cyclic Subspaces 152 5. 4 Generator Matrices and Parity-Check Matrices 159 5. 5 Encoding Cyclic Codest 163 5. 6 Syndromes and Simple Decoding Procedures 168 5. 7 Burst Error Correcting 175 5. 8 Finite Fields and Factoring xn-l over GF(q) 181 5. 9 Another Method for Factoring xn-l over GF(q)t 187 5. 10 Exercises 193 Chapter 6 BCH Codes and Bounds for Cyclic Codes 6. 1 Introduction 201 6. 2 BCH Codes and the BCH Bound 205 6. 3 Bounds for Cyclic Codest 210 6. 4 Decoding BCH Codes 215 6. 5 Linearized Polynomials and Finding Roots of Polynomialst 224 6. 6 Exercises 231 Chapter 7 Error Correction Techniques and Digital Audio Recording 7. 1 Introduction 237 7. 2 Reed-Solomon Codes 237 7. 3 Channel Erasures 240 7. 4 BCH Decoding with Erasures 244 7. 5 Interleaving 250 7. 6 Error Correction and Digital Audio Recording 256 7.
Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
|
You may like...
|