5818a890ab84c.jpg
PDF
Algebraic Curves and Finite Fields: Cryptography and Other Applications

This book collects the results of the workshops on Applications of Algebraic Curves and Applications of Finite Fieldsat the RICAMin 2013. These workshops brought together the most prominent researchers in the area of finite fields and their applications around the world, addressing old and new problems on curves and other aspects of finite fields, with emphasis on their diverse applications to many areas of pure and applied mathematics.

565b21acdf81e.jpeg
PDF
Coding and Cryptology

There are two basic methods of error control for communication, both involving coding of the messages. With forward error correction, the codes are used to detect and correct errors. In a repeat request system, the codes are used to detect errors and, if there are errors, request a retransmission. Error detection is usually much simpler to implement than error correction and is widely used. However, it is given a very cursory treatme...

5621b6a58993f.jpeg
PDF
Coding Theory and Cryptology

The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original ...