Algebraic Coding Theory: History and Development
Author : Ian F. Blake
Publisher :
Page : 440 pages
File Size : 14,80 MB
Release : 1973
Category : Computers
ISBN :
Author : Ian F. Blake
Publisher :
Page : 440 pages
File Size : 14,80 MB
Release : 1973
Category : Computers
ISBN :
Author : Ian F. Blake
Publisher :
Page : 442 pages
File Size : 15,75 MB
Release : 1973
Category : Computers
ISBN :
Author : Elwyn R. Berlekamp
Publisher :
Page : 0 pages
File Size : 19,19 MB
Release : 1968
Category : Coding theory
ISBN :
Author : Harald Niederreiter
Publisher : Princeton University Press
Page : 272 pages
File Size : 45,30 MB
Release : 2009-09-21
Category : Mathematics
ISBN : 140083130X
This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books
Author : Elwyn R Berlekamp
Publisher : World Scientific
Page : 501 pages
File Size : 11,25 MB
Release : 2015-03-26
Category : Mathematics
ISBN : 981463591X
This is the revised edition of Berlekamp's famous book, 'Algebraic Coding Theory', originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field. One of these is an algorithm for decoding Reed-Solomon and Bose-Chaudhuri-Hocquenghem codes that subsequently became known as the Berlekamp-Massey Algorithm. Another is the Berlekamp algorithm for factoring polynomials over finite fields, whose later extensions and embellishments became widely used in symbolic manipulation systems. Other novel algorithms improved the basic methods for doing various arithmetic operations in finite fields of characteristic two. Other major research contributions in this book included a new class of Lee metric codes, and precise asymptotic results on the number of information symbols in long binary BCH codes.Selected chapters of the book became a standard graduate textbook.Both practicing engineers and scholars will find this book to be of great value.
Author : Henning Stichtenoth
Publisher : Springer Science & Business Media
Page : 360 pages
File Size : 30,52 MB
Release : 2009-02-11
Category : Mathematics
ISBN : 3540768785
This book links two subjects: algebraic geometry and coding theory. It uses a novel approach based on the theory of algebraic function fields. Coverage includes the Riemann-Rock theorem, zeta functions and Hasse-Weil's theorem as well as Goppa' s algebraic-geometric codes and other traditional codes. It will be useful to researchers in algebraic geometry and coding theory and computer scientists and engineers in information transmission.
Author : Raymond Hill
Publisher : Oxford University Press
Page : 268 pages
File Size : 49,97 MB
Release : 1986
Category : Computers
ISBN : 9780198538035
Algebraic coding theory is a new and rapidly developing subject, popular for its many practical applications and for its fascinatingly rich mathematical structure. This book provides an elementary yet rigorous introduction to the theory of error-correcting codes. Based on courses given by the author over several years to advanced undergraduates and first-year graduated students, this guide includes a large number of exercises, all with solutions, making the book highly suitable for individual study.
Author : Dave K. Kythe
Publisher : CRC Press
Page : 515 pages
File Size : 16,83 MB
Release : 2017-07-28
Category : Computers
ISBN : 135183245X
Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes. It then examines codes based on the Galois field theory as well as their application in BCH and especially the Reed–Solomon codes that have been used for error correction of data transmissions in space missions. The major outlook in coding theory seems to be geared toward stochastic processes, and this book takes a bold step in this direction. As research focuses on error correction and recovery of erasures, the book discusses belief propagation and distributions. It examines the low-density parity-check and erasure codes that have opened up new approaches to improve wide-area network data transmission. It also describes modern codes, such as the Luby transform and Raptor codes, that are enabling new directions in high-speed transmission of very large data to multiple users. This robust, self-contained text fully explains coding problems, illustrating them with more than 200 examples. Combining theory and computational techniques, it will appeal not only to students but also to industry professionals, researchers, and academics in areas such as coding theory and signal and image processing.
Author : Harald Niederreiter
Publisher : World Scientific
Page : 460 pages
File Size : 42,70 MB
Release : 2002-12-03
Category : Mathematics
ISBN : 981448766X
The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security.
Author : Isaac Woungang
Publisher : World Scientific
Page : 725 pages
File Size : 46,63 MB
Release : 2010-02-26
Category : Computers
ISBN : 981446919X
The last few years have witnessed rapid advancements in information and coding theory research and applications. This book provides a comprehensive guide to selected topics, both ongoing and emerging, in information and coding theory. Consisting of contributions from well-known and high-profile researchers in their respective specialties, topics that are covered include source coding; channel capacity; linear complexity; code construction, existence and analysis; bounds on codes and designs; space-time coding; LDPC codes; and codes and cryptography.All of the chapters are integrated in a manner that renders the book as a supplementary reference volume or textbook for use in both undergraduate and graduate courses on information and coding theory. As such, it will be a valuable text for students at both undergraduate and graduate levels as well as instructors, researchers, engineers, and practitioners in these fields.Supporting Powerpoint Slides are available upon request for all instructors who adopt this book as a course text.