Algebraic Geometry for Coding Theory and Cryptography

IPAM, Los Angeles, CA, February 2016

Nonfiction, Science & Nature, Mathematics, Geometry, Applied
Cover of the book Algebraic Geometry for Coding Theory and Cryptography by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319639314
Publisher: Springer International Publishing Publication: November 15, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319639314
Publisher: Springer International Publishing
Publication: November 15, 2017
Imprint: Springer
Language: English

Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference’s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference’s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.

More books from Springer International Publishing

Cover of the book Intangibles, Market Failure and Innovation Performance by
Cover of the book Capital Structure in the Modern World by
Cover of the book Clinical Cases in Coronary Rotational Atherectomy by
Cover of the book Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection by
Cover of the book Foundations and Practice of Security by
Cover of the book Wireless Coordinated Multicell Systems by
Cover of the book Interactive Collaborative Robotics by
Cover of the book Advances in Computational Plasticity by
Cover of the book Losing Political Office by
Cover of the book Quaternary History of the Coorong Coastal Plain, Southern Australia by
Cover of the book Sensing the Nation's Law by
Cover of the book Radiation Therapy in Hematologic Malignancies by
Cover of the book Sinister Aesthetics by
Cover of the book Handbook of Parent-Child Interaction Therapy for Children on the Autism Spectrum by
Cover of the book Computer Security – ESORICS 2016 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy