Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Algebraic geometry for coding theory and cryptography: IPAM, Los Angeles, CA, February 2016
Bookmark Share

Text

Algebraic geometry for coding theory and cryptography: IPAM, Los Angeles, CA, February 2016

Howe, Everett W. - Personal Name; Lauter, Kristin E. - Personal Name; Walker, Judy L. - Personal Name;

Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference’s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.

Table of Contents
Representations of the Multicast Network Problem
Hypersurfaces in Weighted Projective Spaces Over Finite Fields with Applications to Coding Theory
Isogenies for Point Counting on Genus Two Hyperelliptic Curves with Maximal Real Multiplication
Locally Recoverable Codes from Algebraic Curves and Surfaces
Variations of the McEliece Cryptosystem


Availability
#
Perpustakaan Poltek SSN (Rak 600) 652.8 HOW a
b0002280
Available
Detail Information
Series Title
--
Call Number
652.8 HOW a
Publisher
Cham : Springer., 2017
Collation
xv, 150 hlm.; ilus.; 24 cm
Language
English
ISBN/ISSN
9783319639307
Classification
652.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Cryptography
Coding Theory
Specific Detail Info
--
Statement of Responsibility
Everett W. Howe, Kristin E. Lauter, and Judy. L Walker
Other Information
Link
-
Daftar Isi
-
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?