Gröbner Bases, Coding, and Cryptography

Gröbner Bases, Coding, and Cryptography
Author :
Publisher : Springer Science & Business Media
Total Pages : 428
Release :
ISBN-10 : 9783540938064
ISBN-13 : 3540938060
Rating : 4/5 (64 Downloads)

Synopsis Gröbner Bases, Coding, and Cryptography by : Massimiliano Sala

Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations. This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation.

Gröbner Bases and Applications

Gröbner Bases and Applications
Author :
Publisher : Cambridge University Press
Total Pages : 566
Release :
ISBN-10 : 0521632986
ISBN-13 : 9780521632980
Rating : 4/5 (86 Downloads)

Synopsis Gröbner Bases and Applications by : Bruno Buchberger

Comprehensive account of theory and applications of Gröbner bases, co-edited by the subject's inventor.

Coding and Cryptography

Coding and Cryptography
Author :
Publisher : Springer
Total Pages : 452
Release :
ISBN-10 : 9783540354826
ISBN-13 : 3540354824
Rating : 4/5 (26 Downloads)

Synopsis Coding and Cryptography by : Øyvind Ytrehus

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.

Codes, Cryptology and Curves with Computer Algebra

Codes, Cryptology and Curves with Computer Algebra
Author :
Publisher : Cambridge University Press
Total Pages : 612
Release :
ISBN-10 : 9781108547826
ISBN-13 : 1108547826
Rating : 4/5 (26 Downloads)

Synopsis Codes, Cryptology and Curves with Computer Algebra by : Ruud Pellikaan

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Boolean Gröbner Bases

Boolean Gröbner Bases
Author :
Publisher : Logos Verlag Berlin GmbH
Total Pages : 158
Release :
ISBN-10 : 9783832525972
ISBN-13 : 3832525971
Rating : 4/5 (72 Downloads)

Synopsis Boolean Gröbner Bases by : Michael Brickenstein

There exist very few concepts in computational algebra which are as central to theory and applications as Grobner bases. This thesis describes theory, algorithms and applications for the special case of Boolean polynomials. These parts form the mathematical foundations of the PolyBoRi framework (developed by the author together with Alexander Dreyer). The PolyBoRi framework has applications spread over a large number of domains ranging from formal verification, computational biology to cryptanalysis and many more. It is emerged to a worldwide audience by the Sage computational algebra system.

Algorithmic Algebraic Combinatorics and Gröbner Bases

Algorithmic Algebraic Combinatorics and Gröbner Bases
Author :
Publisher : Springer Science & Business Media
Total Pages : 315
Release :
ISBN-10 : 9783642019609
ISBN-13 : 3642019609
Rating : 4/5 (09 Downloads)

Synopsis Algorithmic Algebraic Combinatorics and Gröbner Bases by : Mikhail Klin

This collection of tutorial and research papers introduces readers to diverse areas of modern pure and applied algebraic combinatorics and finite geometries. There is special emphasis on algorithmic aspects and the use of the theory of Gröbner bases.

Algorithmic Cryptanalysis

Algorithmic Cryptanalysis
Author :
Publisher : CRC Press
Total Pages : 516
Release :
ISBN-10 : 9781420070033
ISBN-13 : 1420070037
Rating : 4/5 (33 Downloads)

Synopsis Algorithmic Cryptanalysis by : Antoine Joux

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.Divided into three parts, the book begins with a

Cryptography and Coding

Cryptography and Coding
Author :
Publisher : Springer
Total Pages : 325
Release :
ISBN-10 : 9783319272399
ISBN-13 : 331927239X
Rating : 4/5 (99 Downloads)

Synopsis Cryptography and Coding by : Jens Groth

This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

Using Algebraic Geometry

Using Algebraic Geometry
Author :
Publisher : Springer Science & Business Media
Total Pages : 513
Release :
ISBN-10 : 9781475769111
ISBN-13 : 1475769113
Rating : 4/5 (11 Downloads)

Synopsis Using Algebraic Geometry by : David A. Cox

An illustration of the many uses of algebraic geometry, highlighting the more recent applications of Groebner bases and resultants. Along the way, the authors provide an introduction to some algebraic objects and techniques more advanced than typically encountered in a first course. The book is accessible to non-specialists and to readers with a diverse range of backgrounds, assuming readers know the material covered in standard undergraduate courses, including abstract algebra. But because the text is intended for beginning graduate students, it does not require graduate algebra, and in particular, does not assume that the reader is familiar with modules.

Boolean Functions for Cryptography and Coding Theory

Boolean Functions for Cryptography and Coding Theory
Author :
Publisher : Cambridge University Press
Total Pages : 577
Release :
ISBN-10 : 9781108634663
ISBN-13 : 1108634664
Rating : 4/5 (63 Downloads)

Synopsis Boolean Functions for Cryptography and Coding Theory by : Claude Carlet

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles with additional topics and recent results. A useful resource for researchers and graduate students, the book balances detailed discussions of properties and parameters with examples of various types of cryptographic attacks that motivate the consideration of these parameters. It provides all the necessary background on mathematics, cryptography, and coding, and an overview on recent applications, such as side channel attacks on smart cards, cloud computing through fully homomorphic encryption, and local pseudo-random generators. The result is a complete and accessible text on the state of the art in single and multiple output Boolean functions that illustrates the interaction between mathematics, computer science, and telecommunications.