Matches in Harvard for { <http://id.lib.harvard.edu/aleph/009147980/catalog> ?p ?o. }
Showing items 1 to 34 of
34
with 100 items per page.
- catalog abstract "TheAAECCsymposiumwasstartedinJune1983byAlainPoli(Toulouse),who, together with Roger Desq, Daniel Lazard, and Paul Camion, organized the ?rst conference. The meaning of the acronym AAECC changed from “Applied - gebra and Error Correcting Codes” to “Applied Algebra, Algebraic Algorithms, and Error Correcting Codes.” One reason for this was the increasing importance of complexity, particularly for decoding algorithms. During the AAECC-12 s- posium the conference committee decided to enforce the theory and practice of the coding side as well as the cryptographic aspects. Algebra was conserved, as in the past, but was slightly more oriented to algebraic geometry codes, ?nite ?elds, complexity, polynomials, and graphs. For AAECC-15 the main subjects covered were: – Block codes. – Algebra and codes: rings, ?elds, AG codes. – Cryptography. – Sequences. – Algorithms, decoding algorithms. – Algebra: constructions in algebra, Galois groups, di?erential algebra, po- nomials. The talks of the six invited speakers characterized the aims of AAECC-15: – P. Sole (“Public Key Cryptosystems Based on Rings”). – S. Lin (“Combinatorics Low Density Parity Check Codes”). – J. Stern (“Cryptography and the Methodology of Provable Security”). – D. Costello (“Graph-Based Convolutional LDPC Codes”). – I. Shparlinsky (“Dynamical Systems Generated by Rational Functions”). – A. Lauder (“Algorithms for Multivariate Polynomials over Finite Fields”).".
- catalog contributor b12887734.
- catalog contributor b12887735.
- catalog contributor b12887736.
- catalog contributor b12887737.
- catalog created "2003.".
- catalog date "2003".
- catalog date "2003.".
- catalog dateCopyrighted "2003.".
- catalog description "Cryptography and the Methodology of Provable Security -- Dynamical Systems Generated by Rational Functions -- Homotopy Methods for Equations over Finite Fields -- Three Constructions of Authentication/Secrecy Codes -- The Jacobi Model of an Elliptic Curve and Side-Channel Analysis -- Fast Point Multiplication on Elliptic Curves through Isogenies -- Interpolation of the Elliptic Curve Diffie-Hellman Mapping -- An Optimized Algebraic Method for Higher Order Differential Attack -- Fighting Two Pirates -- Copyright Control and Separating Systems -- Unconditionally Secure Homomorphic Pre-distributed Commitments -- A Class of Low-Density Parity-Check Codes Constructed Based on Reed-Solomon Codes with Two Information Symbols -- Relative Duality in MacWilliams Identity -- Good Expander Graphs and Expander Codes: Parameters and Decoding -- On the Covering Radius of Certain Cyclic Codes -- Unitary Error Bases: Constructions, Equivalence, and Applications -- Differentially 2-Uniform Cocycles — The Binary Case -- The Second and Third Generalized Hamming Weights of Algebraic Geometry Codes -- Error Correcting Codes over Algebraic Surfaces -- A Geometric View of Decoding AG Codes -- Performance Analysis of M-PSK Signal Constellations in Riemannian Varieties -- Improvements to Evaluation Codes and New Characterizations of Arf Semigroups -- Optimal 2-Dimensional 3-Dispersion Lattices -- On g-th MDS Codes and Matroids -- On the Minimum Distance of Some Families of ?2 k-Linear Codes -- Quasicyclic Codes of Index ? over F q Viewed as F q[x]-Submodules of F q ?[x]/?x m?1? -- Fast Decomposition of Polynomials with Known Galois Group.".
- catalog description "Includes bibliographical references and index.".
- catalog description "TheAAECCsymposiumwasstartedinJune1983byAlainPoli(Toulouse),who, together with Roger Desq, Daniel Lazard, and Paul Camion, organized the ?rst conference. The meaning of the acronym AAECC changed from “Applied - gebra and Error Correcting Codes” to “Applied Algebra, Algebraic Algorithms, and Error Correcting Codes.” One reason for this was the increasing importance of complexity, particularly for decoding algorithms. During the AAECC-12 s- posium the conference committee decided to enforce the theory and practice of the coding side as well as the cryptographic aspects. Algebra was conserved, as in the past, but was slightly more oriented to algebraic geometry codes, ?nite ?elds, complexity, polynomials, and graphs. For AAECC-15 the main subjects covered were: – Block codes. – Algebra and codes: rings, ?elds, AG codes. – Cryptography. – Sequences. – Algorithms, decoding algorithms. – Algebra: constructions in algebra, Galois groups, di?erential algebra, po- nomials. The talks of the six invited speakers characterized the aims of AAECC-15: – P. Sole (“Public Key Cryptosystems Based on Rings”). – S. Lin (“Combinatorics Low Density Parity Check Codes”). – J. Stern (“Cryptography and the Methodology of Provable Security”). – D. Costello (“Graph-Based Convolutional LDPC Codes”). – I. Shparlinsky (“Dynamical Systems Generated by Rational Functions”). – A. Lauder (“Algorithms for Multivariate Polynomials over Finite Fields”).".
- catalog extent "x, 264 p. :".
- catalog identifier "3540401113 (pbk. : acid-free paper)".
- catalog isPartOf "Lecture notes in computer science, 0302-9743 ; 2643".
- catalog issued "2003".
- catalog issued "2003.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.7/2 21".
- catalog subject "Algebra Data processing Congresses.".
- catalog subject "Algebra Data processing.".
- catalog subject "Algorithms Congresses.".
- catalog subject "Algorithms.".
- catalog subject "Coding theory.".
- catalog subject "Computational complexity.".
- catalog subject "Computer science.".
- catalog subject "Computer software.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Error-correcting codes Congresses.".
- catalog subject "QA268 .A355 2003".
- catalog tableOfContents "Cryptography and the Methodology of Provable Security -- Dynamical Systems Generated by Rational Functions -- Homotopy Methods for Equations over Finite Fields -- Three Constructions of Authentication/Secrecy Codes -- The Jacobi Model of an Elliptic Curve and Side-Channel Analysis -- Fast Point Multiplication on Elliptic Curves through Isogenies -- Interpolation of the Elliptic Curve Diffie-Hellman Mapping -- An Optimized Algebraic Method for Higher Order Differential Attack -- Fighting Two Pirates -- Copyright Control and Separating Systems -- Unconditionally Secure Homomorphic Pre-distributed Commitments -- A Class of Low-Density Parity-Check Codes Constructed Based on Reed-Solomon Codes with Two Information Symbols -- Relative Duality in MacWilliams Identity -- Good Expander Graphs and Expander Codes: Parameters and Decoding -- On the Covering Radius of Certain Cyclic Codes -- Unitary Error Bases: Constructions, Equivalence, and Applications -- Differentially 2-Uniform Cocycles — The Binary Case -- The Second and Third Generalized Hamming Weights of Algebraic Geometry Codes -- Error Correcting Codes over Algebraic Surfaces -- A Geometric View of Decoding AG Codes -- Performance Analysis of M-PSK Signal Constellations in Riemannian Varieties -- Improvements to Evaluation Codes and New Characterizations of Arf Semigroups -- Optimal 2-Dimensional 3-Dispersion Lattices -- On g-th MDS Codes and Matroids -- On the Minimum Distance of Some Families of ?2 k-Linear Codes -- Quasicyclic Codes of Index ? over F q Viewed as F q[x]-Submodules of F q ?[x]/?x m?1? -- Fast Decomposition of Polynomials with Known Galois Group.".
- catalog title "Applied algebra, algebraic algorithms, and error-correcting codes : 15th international symposium, AAECC-15, Toulouse, France, May 12-16, 2003 : proceedings / Marc Fossorier, Tom Høholdt, Alain Poli (eds.).".
- catalog type "text".