Finite Fields and Their Applications


Book Description

This book is based on the invited talks of the "RICAM-Workshop on Finite Fields and Their Applications: Character Sums and Polynomials" held at the Federal Institute for Adult Education (BIfEB) in Strobl, Austria, from September 2-7, 2012. Finite fields play important roles in many application areas such as coding theory, cryptography, Monte Carlo and quasi-Monte Carlo methods, pseudorandom number generation, quantum computing, and wireless communication. In this book we will focus on sequences, character sums, and polynomials over finite fields in view of the above mentioned application areas: Chapters 1 and 2 deal with sequences mainly constructed via characters and analyzed using bounds on character sums. Chapters 3, 5, and 6 deal with polynomials over finite fields. Chapters 4 and 9 consider problems related to coding theory studied via finite geometry and additive combinatorics, respectively. Chapter 7 deals with quasirandom points in view of applications to numerical integration using quasi-Monte Carlo methods and simulation. Chapter 8 studies aspects of iterations of rational functions from which pseudorandom numbers for Monte Carlo methods can be derived. The goal of this book is giving an overview of several recent research directions as well as stimulating research in sequences and polynomials under the unified framework of character theory.







Sequences and Their Applications - SETA 2010


Book Description

This volumecontainstherefereedproceedingsoftheSixth International Conf- ence on Sequences and Their Applications (SETA 2010), held in Paris, France, September 13-17, 2010. The previous ?ve conferences were held in Singapore (RepublicofSingapore),Bergen(Norway),Seoul(SouthKorea),Beijing(China) and Lexington (USA). Topics of SETA include: – Randomness of sequences – Correlation (periodic and aperiodic types) and combinatorial aspects of - quences (di?erence sets) – Sequences with applications in coding theory and cryptography – Sequences over ?nite ?elds/rings/function ?elds – Linear and nonlinear feedback shift register sequences – Sequences for radar distance ranging, synchronization, identi?cation, and hardware testing – Sequences for wireless communication – Pseudorandom sequence generators – Boolean and vectorial functions for sequences, coding and/or cryptography – Multidimensional sequences and their correlation properties – Linear and nonlinear complexity of sequences The Technical Program Committee of SETA 2010 refereed 56 submitted - pers. Each paper was reviewed by at least 2 referees (at least 3 when an author was a TPC member) and the TPC selected 33 papers to be presented at the conference. In addition, we had 4 invited papers, byRobert Calderbank(Prin- ton University, USA), James Massey (retired from ETH Zurich, Switzerland), Jong-Seon No (Seoul National University, South Korea) and Arne Winterhof ¨ (Osterreichische Akademie der Wissenschaften, Austria). TheCo-chairsoftheTPCwereClaudeCarlet(Universit´ eParis8,France)and Alexander Pott (Otto-von-Guericke-Universit¨ at, Magdeburg, Germany). They wish to thank the other members of the ProgramCommittee: Thierry P.







Sequences and Their Applications - SETA 2008


Book Description

This book constitutes the refereed proceedings of the 5th International Conference on Sequences and Their Applications, SETA 2008, held in Lexington, KY, USA in September 2008. The 32 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on probabilistic methods and randomness properties of sequences; correlation; combinatorial and algebraic foundations; security aspects of sequences; algorithms; correlation of sequences over rings; nonlinear functions over finite fields.




Properties and Interrelationships of Polynomial, Exponential, Logarithmic and Power Functions with Applications to Modeling Natural Phenomena


Book Description

The book considers properties of polynomial, exponential, logarithmic and power functions. It introduces and proves important relationships between these functions, which enhances the theory and greatly improves the range of theoretical and practical applications, such as the modeling of physical, societal or economical processes. Relationship of the considered functions with the physical reality is another primarily subject of this book. Lots of illustrations and examples based on physical, biological, societal phenomena constitute a substantial part of the book, that facilitates the understanding of introduced modeling concepts and methods. The book is an excellent supplementary material for mathematical and physical courses for undergraduate and graduate studies; a valuable resource for mathematicians working in areas of algebra and analysis. Engineers, researchers, analysts, who use these functions in modeling of different processes and phenomena, will greatly benefit from this book.




Information Security and Privacy


Book Description

This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005. The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography.




Applied Algebra, Algebraic Algorithms and Error-Correcting Codes


Book Description

The AAECC Symposia Series was started in 1983 by Alain Poli (Toulouse), who, together with R. Desq, D. Lazard, and P. Camion, organized the ?rst conference. Originally the acronym AAECC meant “Applied Algebra and Error-Correcting Codes”. Over the years its meaning has shifted to “Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes”, re?ecting the growing importance of complexity in both decoding algorithms and computational algebra. AAECC aims to encourage cross-fertilization between algebraic methods and their applications in computing and communications. The algebraic orientation is towards ?nite ?elds, complexity, polynomials, and graphs. The applications orientation is towards both theoretical and practical error-correction coding, and, since AAECC 13 (Hawaii, 1999), towards cryptography. AAECC was the ?rst symposium with papers connecting Gr ̈obner bases with E-C codes. The balance between theoretical and practical is intended to shift regularly; at AAECC-14 the focus was on the theoretical side. The main subjects covered were: – Codes: iterative decoding, decoding methods, block codes, code construction. – Codes and algebra: algebraic curves, Gr ̈obner bases, and AG codes. – Algebra: rings and ?elds, polynomials. – Codes and combinatorics: graphs and matrices, designs, arithmetic. – Cryptography. – Computational algebra: algebraic algorithms. – Sequences for communications.




Finite Fields with Applications to Coding Theory, Cryptography and Related Areas


Book Description

The Sixth International Conference on Finite Fields and Applications, Fq6, held in the city of Oaxaca, Mexico, from May 21-25, 2001, continued a series of biennial international conferences on finite fields. This volume documents the steadily increasing interest in this topic. Finite fields are an important tool in discrete mathematics and its applications cover algebraic geometry, coding theory, cryptology, design theory, finite geometries, and scientific computation, among others. An important feature is the interplay between theory and applications which has led to many new perspectives in research on finite fields and other areas. This interplay has been emphasized in this series of conferences and certainly was reflected in Fq6. This volume offers up-to-date original research papers by leading experts in the area.




Recent Books