Algebraic Geometry in Coding Theory and Cryptography:
This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discus...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Princeton, NJ
Princeton University Press
[2009]
|
Schlagworte: | |
Online-Zugang: | FAW01 FHA01 FKE01 FLA01 UPA01 FAB01 FCO01 URL des Erstveröffentlichers |
Zusammenfassung: | This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books |
Beschreibung: | Description based on online resource; title from PDF title page (publisher's Web site, viewed 26. Nov 2019) |
Beschreibung: | 1 online resource (272 pages) |
ISBN: | 9781400831302 |
DOI: | 10.1515/9781400831302 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046285458 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 191204s2009 |||| o||u| ||||||eng d | ||
020 | |a 9781400831302 |9 978-1-4008-3130-2 | ||
024 | 7 | |a 10.1515/9781400831302 |2 doi | |
035 | |a (ZDB-23-DGG)9781400831302 | ||
035 | |a (OCoLC)1288420064 | ||
035 | |a (DE-599)BVBBV046285458 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-Aug4 |a DE-859 |a DE-860 |a DE-739 |a DE-1043 |a DE-858 | ||
082 | 0 | |a 003/.54 |2 22 | |
100 | 1 | |a Niederreiter, Harald |4 aut | |
245 | 1 | 0 | |a Algebraic Geometry in Coding Theory and Cryptography |c Harald Niederreiter, Chaoping Xing |
264 | 1 | |a Princeton, NJ |b Princeton University Press |c [2009] | |
264 | 4 | |c © 2010 | |
300 | |a 1 online resource (272 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 26. Nov 2019) | ||
520 | |a This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books | ||
546 | |a In English | ||
650 | 7 | |a MATHEMATICS / Geometry / Algebraic |2 bisacsh | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Geometry, Algebraic | |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Algebraische Geometrie |0 (DE-588)4001161-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Algebraische Geometrie |0 (DE-588)4001161-6 |D s |
689 | 0 | 1 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Xing, Chaoping |4 aut |4 aut | |
856 | 4 | 0 | |u https://doi.org/10.1515/9781400831302 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031663033 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1515/9781400831302?locatt=mode:legacy |l FAW01 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781400831302?locatt=mode:legacy |l FHA01 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781400831302?locatt=mode:legacy |l FKE01 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781400831302?locatt=mode:legacy |l FLA01 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781400831302?locatt=mode:legacy |l UPA01 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781400831302?locatt=mode:legacy |l FAB01 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781400831302?locatt=mode:legacy |l FCO01 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180741237506048 |
---|---|
any_adam_object | |
author | Niederreiter, Harald Xing, Chaoping |
author_facet | Niederreiter, Harald Xing, Chaoping |
author_role | aut aut |
author_sort | Niederreiter, Harald |
author_variant | h n hn c x cx |
building | Verbundindex |
bvnumber | BV046285458 |
collection | ZDB-23-DGG |
ctrlnum | (ZDB-23-DGG)9781400831302 (OCoLC)1288420064 (DE-599)BVBBV046285458 |
dewey-full | 003/.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003/.54 |
dewey-search | 003/.54 |
dewey-sort | 13 254 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1515/9781400831302 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04235nmm a2200601zc 4500</leader><controlfield tag="001">BV046285458</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191204s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400831302</subfield><subfield code="9">978-1-4008-3130-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400831302</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9781400831302</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1288420064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046285458</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-858</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003/.54</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Niederreiter, Harald</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Algebraic Geometry in Coding Theory and Cryptography</subfield><subfield code="c">Harald Niederreiter, Chaoping Xing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ</subfield><subfield code="b">Princeton University Press</subfield><subfield code="c">[2009]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (272 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 26. Nov 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">MATHEMATICS / Geometry / Algebraic</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geometry, Algebraic</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Algebraische Geometrie</subfield><subfield code="0">(DE-588)4001161-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Algebraische Geometrie</subfield><subfield code="0">(DE-588)4001161-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xing, Chaoping</subfield><subfield code="4">aut</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400831302</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031663033</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781400831302?locatt=mode:legacy</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781400831302?locatt=mode:legacy</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781400831302?locatt=mode:legacy</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781400831302?locatt=mode:legacy</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781400831302?locatt=mode:legacy</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781400831302?locatt=mode:legacy</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781400831302?locatt=mode:legacy</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046285458 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:40:35Z |
institution | BVB |
isbn | 9781400831302 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031663033 |
oclc_num | 1288420064 |
open_access_boolean | |
owner | DE-1046 DE-Aug4 DE-859 DE-860 DE-739 DE-1043 DE-858 |
owner_facet | DE-1046 DE-Aug4 DE-859 DE-860 DE-739 DE-1043 DE-858 |
physical | 1 online resource (272 pages) |
psigel | ZDB-23-DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DGG UPA_PDA_DGG ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FCO_PDA_DGG |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Princeton University Press |
record_format | marc |
spelling | Niederreiter, Harald aut Algebraic Geometry in Coding Theory and Cryptography Harald Niederreiter, Chaoping Xing Princeton, NJ Princeton University Press [2009] © 2010 1 online resource (272 pages) txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from PDF title page (publisher's Web site, viewed 26. Nov 2019) This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books In English MATHEMATICS / Geometry / Algebraic bisacsh Coding theory Cryptography Geometry, Algebraic Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Algebraische Geometrie (DE-588)4001161-6 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Algebraische Geometrie (DE-588)4001161-6 s Codierungstheorie (DE-588)4139405-7 s Kryptologie (DE-588)4033329-2 s 1\p DE-604 Xing, Chaoping aut aut https://doi.org/10.1515/9781400831302 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Niederreiter, Harald Xing, Chaoping Algebraic Geometry in Coding Theory and Cryptography MATHEMATICS / Geometry / Algebraic bisacsh Coding theory Cryptography Geometry, Algebraic Codierungstheorie (DE-588)4139405-7 gnd Algebraische Geometrie (DE-588)4001161-6 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4139405-7 (DE-588)4001161-6 (DE-588)4033329-2 |
title | Algebraic Geometry in Coding Theory and Cryptography |
title_auth | Algebraic Geometry in Coding Theory and Cryptography |
title_exact_search | Algebraic Geometry in Coding Theory and Cryptography |
title_full | Algebraic Geometry in Coding Theory and Cryptography Harald Niederreiter, Chaoping Xing |
title_fullStr | Algebraic Geometry in Coding Theory and Cryptography Harald Niederreiter, Chaoping Xing |
title_full_unstemmed | Algebraic Geometry in Coding Theory and Cryptography Harald Niederreiter, Chaoping Xing |
title_short | Algebraic Geometry in Coding Theory and Cryptography |
title_sort | algebraic geometry in coding theory and cryptography |
topic | MATHEMATICS / Geometry / Algebraic bisacsh Coding theory Cryptography Geometry, Algebraic Codierungstheorie (DE-588)4139405-7 gnd Algebraische Geometrie (DE-588)4001161-6 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | MATHEMATICS / Geometry / Algebraic Coding theory Cryptography Geometry, Algebraic Codierungstheorie Algebraische Geometrie Kryptologie |
url | https://doi.org/10.1515/9781400831302 |
work_keys_str_mv | AT niederreiterharald algebraicgeometryincodingtheoryandcryptography AT xingchaoping algebraicgeometryincodingtheoryandcryptography |