Geometries, Codes and Cryptography
β Scribed by G. Longo, M. Marchi, A. Sgarro (eds.)
- Publisher
- Springer-Verlag Wien
- Year
- 1990
- Tongue
- English
- Leaves
- 230
- Series
- International Centre for Mechanical Sciences 313
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory of error-control codes provides techniques for correcting at least part of the errors caused by noise. In the second case cryptography offers the most suitable methods for coping with the many problems linked with secrecy and authentication. Now, both error-control and cryptography schemes can be studied, to a large extent, by suitable geometric models, belonging to the important field of finite geometries. This book provides an update survey of the state of the art of finite geometries and their applications to channel coding against noise and deliberate tampering. The book is divided into two sections, "Geometries and Codes" and "Geometries and Cryptography". The first part covers such topics as Galois geometries, Steiner systems, Circle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and applications of finite geometry to cryptography. This volume recommends itself to engineers dealing with communication problems, to mathematicians and to research workers in the fields of algebraic coding theory, cryptography and information theory.
β¦ Table of Contents
Front Matter....Pages i-v
Front Matter....Pages N1-N1
Lectures on Galois Geometries and Steiner Systems....Pages 1-23
Circle Geometry and Its Application to Code Theory....Pages 25-75
Topics in Algebraic Coding Theory....Pages 77-99
An Introduction to Array Error Control Codes....Pages 101-128
Front Matter....Pages 129-129
An Introduction to the Theory of Unconditional Secrecy and Authentication....Pages 131-160
Applications of Finite Geometry to Cryptography....Pages 161-186
Authentication / Secrecy Codes....Pages 187-199
Geometric Threshold Schemes....Pages 201-212
W*Mβs: A Survey Writing on Some Binary Memories with Constraints....Pages 213-227
Back Matter....Pages 228-228
β¦ Subjects
Data Encryption; Coding and Information Theory; Algebraic Geometry; Geometry
π SIMILAR VOLUMES
</p>This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed di
This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discus
<p>This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed dis