Coding Theory And Cryptology


Book Description

The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security.




Group Theory, Combinatorics, and Computing


Book Description

This volume contains the proceedings of the International Conference on Group Theory, Combinatorics and Computing held from October 3-8, 2012, in Boca Raton, Florida. The papers cover a number of areas in group theory and combinatorics. Topics include finite simple groups, groups acting on structured sets, varieties of algebras, classification of groups generated by 3-state automata over a 2-letter alphabet, new methods for construction of codes and designs, groups with constraints on the derived subgroups of its subgroups, graphs related to conjugacy classes in groups, and lexicographical configurations. Application of computer algebra programs is incorporated in several of the papers. This volume includes expository articles on finite coverings of loops, semigroups and groups, and on the application of algebraic structures in the theory of communications. This volume is a valuable resource for researchers and graduate students working in group theory and combinatorics. The articles provide excellent examples of the interplay between the two areas.




Combinatorial Designs for Authentication and Secrecy Codes


Book Description

Combinatorial Designs for Authentication and Secrecy Codes is a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer and communication security. This monograph provides a tutorial on combinatorial designs, which gives an overview of the theory. Furthermore, the application of combinatorial designs to authentication and secrecy codes is described in depth. This close relationship of designs with cryptography and information security was first revealed in Shannon's seminal paper on secrecy systems. We bring together in one source foundational and current contributions concerning design-theoretic constructions and characterizations of authentication and secrecy codes.




Concise Encyclopedia of Coding Theory


Book Description

Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has grown into a discipline with many practical applications (antennas, networks, memories), requiring various mathematical techniques, from commutative algebra, to semi-definite programming, to algebraic geometry. Most topics covered in the Concise Encyclopedia of Coding Theory are presented in short sections at an introductory level and progress from basic to advanced level, with definitions, examples, and many references. The book is divided into three parts: Part I fundamentals: cyclic codes, skew cyclic codes, quasi-cyclic codes, self-dual codes, codes and designs, codes over rings, convolutional codes, performance bounds Part II families: AG codes, group algebra codes, few-weight codes, Boolean function codes, codes over graphs Part III applications: alternative metrics, algorithmic techniques, interpolation decoding, pseudo-random sequences, lattices, quantum coding, space-time codes, network coding, distributed storage, secret-sharing, and code-based-cryptography. Features Suitable for students and researchers in a wide range of mathematical disciplines Contains many examples and references Most topics take the reader to the frontiers of research




Cryptography and Coding


Book Description

This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.




Discrete Mathematics and Applications


Book Description

Advances in discrete mathematics are presented in this book with applications in theoretical mathematics and interdisciplinary research. Each chapter presents new methods and techniques by leading experts. Unifying interdisciplinary applications, problems, and approaches of discrete mathematics, this book connects topics in graph theory, combinatorics, number theory, cryptography, dynamical systems, finance, optimization, and game theory. Graduate students and researchers in optimization, mathematics, computer science, economics, and physics will find the wide range of interdisciplinary topics, methods, and applications covered in this book engaging and useful.




Combinatorics and Finite Fields


Book Description

Combinatorics and finite fields are of great importance in modern applications such as in the analysis of algorithms, in information and communication theory, and in signal processing and coding theory. This book contains survey articles on topics such as difference sets, polynomials, and pseudorandomness.




NeutroGeometry, NeutroAlgebra, and SuperHyperAlgebra in Today's World


Book Description

NeutroAlgebra and AntiAlgebra were extended to NeutroGeometry and AntiGeometry in order to catch the Non-Euclidean Geometries. In the real world, the spaces and the elements that populate them and the rules that apply to them are not perfect, uniform, homogeneous, or complete. They are fragmentary and disparate, with unclear and conflicting information, and they do not apply in the same degree to each element. Therefore, these partial, hybrid, and mixed structures are necessary. NeutroGeometry, NeutroAlgebra, and SuperHyperAlgebra in Today's World presents applications of many NeutroStructures in our real world and considers NeutroGeometry and AntiGeometry as new fields of research that resemble everyday life. Covering key topics such as hyperbolic geometry, elliptic geometry, and AntiGeometry, this reference work is ideal for mathematicians, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.




Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory


Book Description

Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.