MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Coding theory and cryptography : from enigma and Geheimschreiber to quantum theory / edited by David Joyner.

Contributor(s): Joyner, David, 1959-.
Material type: materialTypeLabelBookPublisher: Berlin : Springer, c2000Description: vi, 256 p. : ill. ; 24 cm + pbk.ISBN: 3540663363.Subject(s): Coding theory | CryptographyDDC classification: 003.54
Contents:
Reminiscences and Reflections of a Codebreaker / Peter Hilton -- FISH and I / W. T. Tutte -- Sturgeon, The FISH BP Never Really Caught / Frode Weierud -- ENIGMA and PURPLE: How the Allies broke German and Japanese Codes during the War / David A. Hatch -- The Geheimschreiber Secret / Lars Ulfuing, Frode Weierud -- The RSA Public Key Crytosystem / William P. Wardlaw -- Number theory and Cryptography (using Maple) / John Cosgrave -- A talk on Quantum Cryptography or How Alice Outwits Eve / Samuel J. Lomonaco, Jr. -- The rigidity theorems of Hamada and Ohmori, Revisited / T. S. Michael -- Counting Prime Divisors on Elliptic Curves and Multiplication in Finite Fields / M. Amin Shokrollahi -- On Cyclic MDS-Codes / M. Amin Shokrollahi -- Computing roots of polynomials over function fields of curves / Shuhong Gao, M. Amin Shokrallahi -- Remarks on codes from modular curves: MAPLE applications / David Joyner and Salahoddin Shokranian.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 003.54 (Browse shelf(Opens below)) 1 Available 00085670
Total holds: 0

Enhanced descriptions from Syndetics:

The National Security Agency funded a conference on Coding theory, Cryp- tography, and Number Theory (nick-named Cryptoday) at the United States Naval Academy, on October 25-27, 1998. We were very fortunate to have been able to attract talented mathematicians and cryptographers to the meeting. Unfortunately, some people couldn't make it for either scheduling or funding reasons. Some of these have been invited to contribute a paper anyway. In addition, Prof. William Tutte and Frode Weierud have been kind enough to allow the inclusion of some very interesting unpublished papers of theirs. The papers basically fall into three catagories. Historical papers on cryp- tography done during World War II (Hatch, Hilton, Tutte, Ulfving, and Weierud), mathematical papers on more recent methods in cryptography (Cosgrave, Lomonoco, Wardlaw), and mathematical papers in coding theory (Gao, Joyner, Michael, Shokranian, Shokrollahi). A brief biography of the authors follows. - Peter Hilton is a Distinguished Professor of Mathematics Emeritus at the State University of New York at Binghamton. He worked from 1941 to 1945 in the British cryptanalytic headquarters at Bletchley Park. Profes- sor Hilton has done extensive research in algebraic topology and group theory. - William Tutte is a Distinguished Professor Emeritus and an Adjunct Pro- fessor in the Combinatorics and Optimization Department at the Univer- sity of Waterloo. He worked from 1941 to 1945 in the British cryptana- lytic headquarters at Bletchley Park. Professor Tutte has done extensive research in the field of combinatorics.

Includes bibliographical references and index.

Reminiscences and Reflections of a Codebreaker / Peter Hilton -- FISH and I / W. T. Tutte -- Sturgeon, The FISH BP Never Really Caught / Frode Weierud -- ENIGMA and PURPLE: How the Allies broke German and Japanese Codes during the War / David A. Hatch -- The Geheimschreiber Secret / Lars Ulfuing, Frode Weierud -- The RSA Public Key Crytosystem / William P. Wardlaw -- Number theory and Cryptography (using Maple) / John Cosgrave -- A talk on Quantum Cryptography or How Alice Outwits Eve / Samuel J. Lomonaco, Jr. -- The rigidity theorems of Hamada and Ohmori, Revisited / T. S. Michael -- Counting Prime Divisors on Elliptic Curves and Multiplication in Finite Fields / M. Amin Shokrollahi -- On Cyclic MDS-Codes / M. Amin Shokrollahi -- Computing roots of polynomials over function fields of curves / Shuhong Gao, M. Amin Shokrallahi -- Remarks on codes from modular curves: MAPLE applications / David Joyner and Salahoddin Shokranian.

Table of contents provided by Syndetics

  • Reminiscences and Reflections of a Codebreaker (p. 1)
  • FISH and I (p. 9)
  • Sturgeon, The FISH BP Never Really Caught (p. 18)
  • ENIGMA and PURPLE: How the Allies Broke German and Japanese Codes During the War (p. 53)
  • The Geheimschreiber Secret (p. 62)
  • The RSA Public Key Cryptosystem (p. 101)
  • Number Theory and Cryptography (using Maple) (p. 124)
  • A Talk on Quantum Cryptography or How Alice Outwits Eve (p. 144)
  • The Rigidity Theorems of Hamada and Ohmori, Revisited (p. 175)
  • Counting Prime Divisors on Elliptic Curves and Multiplication in Finite Fields (p. 180)
  • On Cyclic MDS-Codes (p. 202)
  • Computing Roots of Polynomials over Function Fields of Curves (p. 214)
  • Remarks on codes from modular curves: MAPLE applications (p. 229)
  • Index (p. 251)

Powered by Koha