Gröbner Bases, Coding, and Cryptography
Sold by Mispah books, Redhill, SURRE, United Kingdom
AbeBooks Seller since April 15, 2021
Used - Soft cover
Condition: Used - As new
Quantity: 1 available
Add to basketSold by Mispah books, Redhill, SURRE, United Kingdom
AbeBooks Seller since April 15, 2021
Condition: Used - As new
Quantity: 1 available
Add to basketCoding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations.
This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will findthat all chapters fit nicely within a unified notation.
Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside.
Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations.
This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation.
"About this title" may belong to another edition of this title.
We offer excellent customer service & easy return facility.
we ship from Multiple location,UK,India,US
Return address:
Mispah books
flat4 ,
Centenary court, 30 Warwick Road
Redhill , SURRE RH1 1FQ
United Kingdom
Our rates depends on weight of the item & shipping destination
Order quantity | 14 to 15 business days | 9 to 10 business days |
---|---|---|
First item | US$ 33.88 | US$ 36.59 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.