𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Finite geometries, LDPC codes and cryptography

✍ Scribed by Vasyl Ustimenko; Urszula RomaΕ„czuk


Publisher
Uniwersytet Marii Curie-SkΕ‚odowskiej w Lublinie
Year
2012
Tongue
English
Leaves
186
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Error-Correcting Codes, Finite Geometrie
✍ Aiden A. Bruen, David L. Wehlau, Aiden A. Bruen, David L. Wehlau (ed.) πŸ“‚ Library πŸ“… 2010 πŸ› American Mathematical Society 🌐 English

This interdisciplinary volume contains papers from both a conference and special session on Error-Control Codes, Information Theory and Applied Cryptography. The conference was held at the Fields Institute in Toronto, ON, Canada from December 5-6, 2007, and the special session was held at the Canadi

Error-Correcting Codes, Finite Geometrie
✍ Aiden A. Bruen, David L. Wehlau, Aiden A. Bruen, David L. Wehlau (ed.) πŸ“‚ Library πŸ“… 2010 πŸ› American Mathematical Society 🌐 English

This interdisciplinary volume contains papers from both a conference and special session on Error-Control Codes, Information Theory and Applied Cryptography. The conference was held at the Fields Institute in Toronto, ON, Canada from December 5-6, 2007, and the special session was held at the Canadi

QC-LDPC Code-Based Cryptography
✍ Marco Baldi (auth.) πŸ“‚ Library πŸ“… 2014 πŸ› Springer International Publishing 🌐 English

<p><p>This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the mai

Geometries, Codes and Cryptography
✍ G. Longo, M. Marchi, A. Sgarro (eds.) πŸ“‚ Library πŸ“… 1990 πŸ› Springer-Verlag Wien 🌐 English

<p>The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory o