Online Public Access Catalogue (OPAC)
Central Library - Vidyasagar University

“Education does not only mean learning, reading, writing, and arithmetic,

it should provide a comprehensive knowledge”

-Ishwarchandra Vidyasagar


Normal view MARC view ISBD view

Algebraic Geometry Modeling in Information Theory [ electronic resource ] / by Edgar Martínez Moro.

Contributor(s): Moro, Edgar Martínez [editor].
Material type: TextTextPublisher: World Scientific Publishing Co. Pte. Ltd., 2013ISBN: 9789314335768 ( e-book ).Subject(s): MathematicsGenre/Form: Electronic booksOnline resources: https://www.worldscientific.com/worldscibooks/10.1142/8049#t=aboutBook View to click Summary: Algebraic & geometry methods have constituted a basic background and tool for people working on classic block coding theory and cryptography. Nowadays, new paradigms on coding theory and cryptography have arisen such as: Network coding, S-Boxes, APN Functions, Steganography and decoding by linear programming. Again understanding the underlying procedure and symmetry of these topics needs a whole bunch of non trivial knowledge of algebra and geometry that will be used to both, evaluate those methods and search for new codes and cryptographic applications. This book shows those methods in a self-contained form.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
E-Book E-Book WWW
Available EB372

Algebraic & geometry methods have constituted a basic background and tool for people working on classic block coding theory and cryptography. Nowadays, new paradigms on coding theory and cryptography have arisen such as: Network coding, S-Boxes, APN Functions, Steganography and decoding by linear programming. Again understanding the underlying procedure and symmetry of these topics needs a whole bunch of non trivial knowledge of algebra and geometry that will be used to both, evaluate those methods and search for new codes and cryptographic applications. This book shows those methods in a self-contained form.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha