Applied algebra : codes, ciphers, and discrete algorithms /: codes, ciphers, and discrete algorithms. (©2009)
- Record Type:
- Book
- Title:
- Applied algebra : codes, ciphers, and discrete algorithms /: codes, ciphers, and discrete algorithms. (©2009)
- Main Title:
- Applied algebra : codes, ciphers, and discrete algorithms
- Further Information:
- Note: Darel W. Hardy, Fred Richman, Carol L. Walker.
- Other Names:
- Hardy, Darel W
Walker, Carol L, 1935-
Richman, Fred, 1938- - Contents:
- Preface Integers and Computer Algebra Integers Computer Algebra vs. Numerical Analysis Sums and Products Mathematical Induction Codes Binary and Hexadecimal Codes ASCII Code Morse Code Braille Two-out-of-Five Code Hollerith Codes Euclidean Algorithm The Mod Function Greatest Common Divisors Extended Euclidean Algorithm The Fundamental Theorem of Arithmetic Modular Arithmetic Ciphers Cryptography Cryptanalysis Substitution and Permutation Ciphers Block Ciphers The Playfair Cipher Unbreakable Ciphers Enigma Machine Error-Control Codes Weights and Hamming Distance Bar Codes Based on Two-out-of-Five Code Other Commercial Codes Hamming (7, 4) Code Chinese Remainder Theorem Systems of Linear Equations Modulo n Chinese Remainder Theorem Extended Precision Arithmetic Greatest Common Divisor of Polynomials Hilbert Matrix Theorems of Fermat and Euler Wilson’s Theorem Powers Modulo n Fermat’s Little Theorem Rabin’s Probabilistic Primality Test Exponential Ciphers Euler’s Theorem Public Key Ciphers The Rivest–Shamir–Adleman Cipher System Electronic Signatures A System for Exchanging Messages Knapsack Ciphers Digital Signature Standard Finite Fields The Galois Field GFp The Ring GFp [x ] of Polynomials The Galois Field GF 4 The Galois Fields GF 8 and GF 16 The Galois Field GFp n The Multiplicative Group of GFp n Random Number Generators Error-Correcting Codes BCH Codes A BCH Decoder Reed–Solomon Codes Advanced Encryption Standard Data Encryption Standard The Galois Field GF 256 ThePreface Integers and Computer Algebra Integers Computer Algebra vs. Numerical Analysis Sums and Products Mathematical Induction Codes Binary and Hexadecimal Codes ASCII Code Morse Code Braille Two-out-of-Five Code Hollerith Codes Euclidean Algorithm The Mod Function Greatest Common Divisors Extended Euclidean Algorithm The Fundamental Theorem of Arithmetic Modular Arithmetic Ciphers Cryptography Cryptanalysis Substitution and Permutation Ciphers Block Ciphers The Playfair Cipher Unbreakable Ciphers Enigma Machine Error-Control Codes Weights and Hamming Distance Bar Codes Based on Two-out-of-Five Code Other Commercial Codes Hamming (7, 4) Code Chinese Remainder Theorem Systems of Linear Equations Modulo n Chinese Remainder Theorem Extended Precision Arithmetic Greatest Common Divisor of Polynomials Hilbert Matrix Theorems of Fermat and Euler Wilson’s Theorem Powers Modulo n Fermat’s Little Theorem Rabin’s Probabilistic Primality Test Exponential Ciphers Euler’s Theorem Public Key Ciphers The Rivest–Shamir–Adleman Cipher System Electronic Signatures A System for Exchanging Messages Knapsack Ciphers Digital Signature Standard Finite Fields The Galois Field GFp The Ring GFp [x ] of Polynomials The Galois Field GF 4 The Galois Fields GF 8 and GF 16 The Galois Field GFp n The Multiplicative Group of GFp n Random Number Generators Error-Correcting Codes BCH Codes A BCH Decoder Reed–Solomon Codes Advanced Encryption Standard Data Encryption Standard The Galois Field GF 256 The Rijndael Block Cipher Polynomial Algorithms and Fast Fourier Transforms Lagrange Interpolation Formula Kronecker’s Algorithm Neville’s Iterated Interpolation Algorithm Secure Multiparty Protocols Discrete Fourier Transforms Fast Fourier Interpolation Appendix A: Topics in Algebra and Number Theory Number Theory Groups Rings and Polynomials Fields Linear Algebra and Matrices Solutions to Odd Problems Bibliography Notation Algorithms Figures Tables Index … (more)
- Edition:
- 2nd ed
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2009
- Copyright Date:
- 2009
- Extent:
- 1 online resource (410 pages), illustrations
- Subjects:
- 003.54
Coding theory
Computer security -- Mathematics
Electronic books - Languages:
- English
- ISBNs:
- 9781439894699
1439894698 - Notes:
- Note: Includes bibliographical references (pages 395-396) and index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.148676
- Ingest File:
- 01_111.xml