𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Theory Coding And Cryptography

✍ Scribed by Ranjan Bose


Publisher
Mc Graw Hill India
Year
2016
Tongue
English
Leaves
489
Edition
3
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Title
Contents
Pre-requisite
PART - I Information Theory and Source Coding
1 Source Coding
2 Channel Capacity and Coding
PART - II Error Control Coding (Channel Coding)
3 Linear Block Codes for Error Correction
4 Cyclic Codes
5 Bose – Chaudhuri Hocquenghem (BCH) Codes
6 Space–Time Codes
PART - III Codes on Graph
7 Convolutional Codes
8 Trellis CodedModulation
PART - IV Coding for Secure Communications
9 Cryptography
10 Physical Layer Security
Index


πŸ“œ SIMILAR VOLUMES


Information theory coding and cryptograp
✍ Mandal, Surajit; Manna, Nilotpal; Saha, Arjit πŸ“‚ Library πŸ“… 2013 πŸ› Pearson Education India; Dorling Kindersley (India 🌐 English

"Information Theory, Coding & Cryptography" has been designed as a comprehensive text for the students of engineering discussing Source Encoding, Error Control Codes & Cryptography. The book contains the recent developments of coded modulation, trellises for codes, turbo coding for reliable

Foundations of Coding: Theory and Applic
✍ Jiri Adamek(auth.) πŸ“‚ Library πŸ“… 1991 🌐 English

Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding methods. Background material on modern algebra is p

Elementary Number Theory, Cryptography a
✍ M. Welleda Baldoni, Ciro Ciliberto, G.M. Piacentini Cattaneo, Daniele Gewurz πŸ“‚ Library πŸ“… 2008 πŸ› Springer 🌐 English

<P>In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic residues, primality tests, continued fractions, etc.) which in recent years have proven to be extremely useful for applications to cryptography and co