Dewey Class |
516.35 |
Titel |
Algebraic Geometry for Coding Theory and Cryptography ([EBook]) : IPAM, Los Angeles, CA, February 2016 / / edited by Everett W. Howe, Kristin E. Lauter, Judy L. Walker. |
Added Personal Name |
Howe, Everett W. editor. |
Lauter, Kristin E. editor. |
Walker, Judy L. editor. |
Other name(s) |
SpringerLink (Online service) |
Veröffentl |
Cham : : Springer International Publishing : : Imprint: Springer, , 2017. |
Physical Details |
XV, 150 p. 8 illus., 2 illus. in color. : online resource. |
Reihe |
Association for Women in Mathematics Series 2364-5733 ; ; 9 |
ISBN |
9783319639314 |
Summary Note |
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference?s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.: |
Contents note |
1. Representations of the Multicast Network Problem -- 2. Hypersurfaces in weighted projective spaces over finite fields with?applications to coding theory -- 3.?Isogenies for point counting on genus two hyperelliptic curves with?maximal real multiplication -- 4. Locally recoverable codes from algebraic curves and surfaces -- 5. Variations of the McEliece Cryptosystem. |
System details note |
Online access to this digital book is restricted to subscription institutions through IP address (only for SISSA internal users) |
Internet Site |
http://dx.doi.org/10.1007/978-3-319-63931-4 |
LINKS ZU 'VERWANDTEN WERKEN |
Schlagwörter: .
Algebraic Geometry .
Computer mathematics .
Computer Science .
Data Encryption .
Data encryption (Computer science) .
Mathematical Applications in Computer Science .
Mathematics .
Authors:
Corporate Authors:
Series:
Classification:
|