Author: Gary L. Mullen,Daniel Panario
Publisher: CRC Press
Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and format throughout and each chapter is self contained and peer reviewed. The first part of the book traces the history of finite fields through the eighteenth and nineteenth centuries. The second part presents theoretical properties of finite fields, covering polynomials, special functions, sequences, algorithms, curves, and related computational aspects. The final part describes various mathematical and practical applications of finite fields in combinatorics, algebraic coding theory, cryptographic systems, biology, quantum information theory, engineering, and other areas. The book provides a comprehensive index and easy access to over 3,000 references, enabling you to quickly locate up-to-date facts and results regarding finite fields.
7th International Conference, Fq7, Toulouse, France, May 5-9, 2003, Revised Papers
Author: Gary L. Mullen,Alain Poli,Henning Stichtenoth
Author: Kenneth H. Rosen
Publisher: CRC Press
The importance of discrete and combinatorial mathematics continues to increase as the range of applications to computer science, electrical engineering, and the biological sciences grows dramatically. Providing a ready reference for practitioners in the field, the Handbook of Discrete and Combinatorial Mathematics, Second Edition presents additional material on Google's matrix, random graphs, geometric graphs, computational topology, and other key topics. New chapters highlight essential background information on bioinformatics and computational geometry. Each chapter includes a glossary, definitions, facts, examples, algorithms, major applications, and references.
Author: Derek F. Holt,Bettina Eick,Eamonn A. O'Brien
Publisher: CRC Press
The origins of computation group theory (CGT) date back to the late 19th and early 20th centuries. Since then, the field has flourished, particularly during the past 30 to 40 years, and today it remains a lively and active branch of mathematics. The Handbook of Computational Group Theory offers the first complete treatment of all the fundamental methods and algorithms in CGT presented at a level accessible even to advanced undergraduate students. It develops the theory of algorithms in full detail and highlights the connections between the different aspects of CGT and other areas of computer algebra. While acknowledging the importance of the complexity analysis of CGT algorithms, the authors' primary focus is on algorithms that perform well in practice rather than on those with the best theoretical complexity. Throughout the book, applications of all the key topics and algorithms to areas both within and outside of mathematics demonstrate how CGT fits into the wider world of mathematics and science. The authors include detailed pseudocode for all of the fundamental algorithms, and provide detailed worked examples that bring the theorems and algorithms to life.
Author: Csaba D. Toth,Joseph O'Rourke,Jacob E. Goodman
Publisher: CRC Press
While high-quality books and journals in this field continue to proliferate, none has yet come close to matching the Handbook of Discrete and Computational Geometry, which in its first edition, quickly became the definitive reference work in its field. But with the rapid growth of the discipline and the many advances made over the past seven years, it's time to bring this standard-setting reference up to date. Editors Jacob E. Goodman and Joseph O'Rourke reassembled their stellar panel of contributors, added manymore, and together thoroughly revised their work to make the most important results and methods, both classic and cutting-edge, accessible in one convenient volume. Now over more then 1500 pages, the Handbook of Discrete and Computational Geometry, Second Edition once again provides unparalleled, authoritative coverage of theory, methods, and applications. Highlights of the Second Edition: Thirteen new chapters: Five on applications and others on collision detection, nearest neighbors in high-dimensional spaces, curve and surface reconstruction, embeddings of finite metric spaces, polygonal linkages, the discrepancy method, and geometric graph theory Thorough revisions of all remaining chapters Extended coverage of computational geometry software, now comprising two chapters: one on the LEDA and CGAL libraries, the other on additional software Two indices: An Index of Defined Terms and an Index of Cited Authors Greatly expanded bibliographies
Number Theory and Cryptography, Second Edition
Author: Lawrence C. Washington
Publisher: CRC Press
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. With additional exercises, this edition offers more comprehensive coverage of the fundamental theory, techniques, and applications of elliptic curves. New to the Second Edition Chapters on isogenies and hyperelliptic curves A discussion of alternative coordinate systems, such as projective, Jacobian, and Edwards coordinates, along with related computational issues A more complete treatment of the Weil and Tate–Lichtenbaum pairings Doud’s analytic method for computing torsion on elliptic curves over Q An explanation of how to perform calculations with elliptic curves in several popular computer algebra systems Taking a basic approach to elliptic curves, this accessible book prepares readers to tackle more advanced problems in the field. It introduces elliptic curves over finite fields early in the text, before moving on to interesting applications, such as cryptography, factoring, and primality testing. The book also discusses the use of elliptic curves in Fermat’s Last Theorem. Relevant abstract algebra material on group theory and fields can be found in the appendices.
5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers
Author: Çetin Kaya Koç,Sihem Mesnager,Erkay Savaş
This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey, in September 2014. The 9 revised full papers and 43 invited talks presented were carefully reviewed and selected from 27 submissions. This workshop is a forum of mathematicians, computer scientists, engineers and physicists performing research on finite field arithmetic, interested in communicating the advances in the theory, applications, and implementations of finite fields. The workshop will help to bridge the gap between the mathematical theory of finite fields and their hardware/software implementations and technical applications.
Author: Rudolf Lidl,Harald Niederreiter
Publisher: Cambridge University Press
This book is devoted entirely to the theory of finite fields.
Author: Anne Canteaut,Gove Effinger,Sophie Huczynska,Daniel Panario,Leo Storme
Publisher: World Scientific
The volume is a collection of 20 refereed articles written in connection with lectures presented at the 12th International Conference on Finite Fields and Their Applications ("Fq12") at Skidmore College in Saratoga Springs, NY in July 2015. Finite fields are central to modern cryptography and secure digital communication, and hence must evolve rapidly to keep pace with new technologies. Topics in this volume include cryptography, coding theory, structure of finite fields, algorithms, curves over finite fields, and further applications. Contributors will include: Antoine Joux (Fondation Partenariale de l'UPMC, France); Gary Mullen (Penn State University, USA); Gohar Kyureghyan (Otto-von-Guericke Universität, Germany); Gary McGuire (University College Dublin, Ireland); Michel Lavrauw (Università degli Studi di Padova, Italy); Kirsten Eisentraeger (Penn State University, USA); Renate Scheidler (University of Calgary, Canada); Michael Zieve (University of Michigan, USA). Contents:Divisibility of L-Polynomials for a Family of Curves (I Blanco-Chacón, R Chapman, S Fordham and G McGuire)Divisibility of Exponential Sums Associated to Binomials Over 𝔽p (F Castro, R Figueroa, P Guan and J Ortiz-Ubarri)Dickson Polynomials that are Involutions (P Charpin, S Mesnager and S Sarkar)Constructing Elliptic Curves and Curves of Genus 2 over Finite Fields (K Eisenträger)A Family of Plane Curves with Two or More Galois Points in Positive Characteristic (S Fukasawa)Permutation Polynomials of 𝔽q2 of the Form αX + Xr(q-1)+1 (X-D Hou)Character Sums and Generating Sets (M-D A Huang and L Liu)Nearly Sparse Linear Algebra and Application to Discrete Logarithms Computations (A Joux and C Pierrot)Full Degree Two del Pezzo Surfaces over Small Finite Fields (A Knecht and K Reyes)Diameter of Some Monomial Digraphs (A Kodess, F Lazebnik, S Smith and J Sporre)Permutation Polynomials of the Form X + γTr(Xk) (G Kyureghyan and M Zieve)Scattered Spaces in Galois Geometry (M Lavrauw)On the Value Set of Small Families of Polynomials over a Finite Field, III (G Matera, M Pérez and Melina Privitelli)The Density of Unimodular Matrices over Integrally Closed Subrings of Function Fields (G Micheli and R Schnyder)Some Open Problems Arising from My Recent Finite Field Research (G L Mullen)On Coefficients of Powers of Polynomials and Their Compositions over Finite Fields (G L Mullen, A Muratović-Ribić and Q Wang)On the Structure of Certain Reduced Linear Modular Systems (E Orozco)Finding a Gröbner Basis for the Ideal of Recurrence Relations on m-Dimensional Periodic Arrays (I M Rubio, M Sweedler and C Heegard)An Introduction to Hyperelliptic Curve Arithmetic (R Scheidler)On the Existence of Aperiodic Complementary Hexagonal Lattice Arrays (Y Tan and G Gong) Readership: Researchers in combinatorics and graph theory, numerical analysis and computational mathematics, and coding theory.
Author: Kenneth Rosen
Publisher: McGraw-Hill Higher Education
Author: Eric Gossett
Publisher: John Wiley & Sons
"Discrete mathematics has become increasingly popular in recent years due to its growing applications in the field of computer science. - Discrete Mathematics with Proof, Second Edition continues to facilitate an up-to-date understanding of this important topic, exposing readers to a wide range of modern and technological applications. Assuming only a basic background in calculus, Discrete Mathematics with Proof, Second Edition is an excellent book for mathematics and computer science courses at the undergraduate level. - It is also a valuable resource for professionals in various technical fields who would like an introduction to discrete mathematics."--Jacket.
Author: Alfred J. Menezes,Paul C. van Oorschot,Scott A. Vanstone
Publisher: CRC Press
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
Author: Thomas Koshy
This approachable text studies discrete objects and the relationsips that bind them. It helps students understand and apply the power of discrete math to digital computer systems and other modern applications. It provides excellent preparation for courses in linear algebra, number theory, and modern/abstract algebra and for computer science courses in data structures, algorithms, programming languages, compilers, databases, and computation. * Covers all recommended topics in a self-contained, comprehensive, and understandable format for students and new professionals * Emphasizes problem-solving techniques, pattern recognition, conjecturing, induction, applications of varying nature, proof techniques, algorithm development and correctness, and numeric computations * Weaves numerous applications into the text * Helps students learn by doing with a wealth of examples and exercises: - 560 examples worked out in detail - More than 3,700 exercises - More than 150 computer assignments - More than 600 writing projects * Includes chapter summaries of important vocabulary, formulas, and properties, plus the chapter review exercises * Features interesting anecdotes and biographies of 60 mathematicians and computer scientists * Instructor's Manual available for adopters * Student Solutions Manual available separately for purchase (ISBN: 0124211828)
Author: I.N. Bronshtein,K.A. Semendyayev,Gerhard Musiol,Heiner Mühlig
This guide book to mathematics contains in handbook form the fundamental working knowledge of mathematics which is needed as an everyday guide for working scientists and engineers, as well as for students. Easy to understand, and convenient to use, this guide book gives concisely the information necessary to evaluate most problems which occur in concrete applications. In the newer editions emphasis was laid on those fields of mathematics that became more important for the formulation and modeling of technical and natural processes, namely Numerical Mathematics, Probability Theory and Statistics, as well as Information Processing. Besides many enhancements and new paragraphs, new sections on Geometric and Coordinate Transformations, Quaternions and Applications, and Lie Groups and Lie Algebras were added for the sixth edition.
Author: Alasdair McAndrew
Publisher: CRC Press
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises. Focusing on the cryptosystems themselves rather than the means of breaking them, the book first explores when and how the methods of modern cryptography can be used and misused. It then presents number theory and the algorithms and methods that make up the basis of cryptography today. After a brief review of "classical" cryptography, the book introduces information theory and examines the public-key cryptosystems of RSA and Rabin’s cryptosystem. Other public-key systems studied include the El Gamal cryptosystem, systems based on knapsack problems, and algorithms for creating digital signature schemes. The second half of the text moves on to consider bit-oriented secret-key, or symmetric, systems suitable for encrypting large amounts of data. The author describes block ciphers (including the Data Encryption Standard), cryptographic hash functions, finite fields, the Advanced Encryption Standard, cryptosystems based on elliptical curves, random number generation, and stream ciphers. The book concludes with a look at examples and applications of modern cryptographic systems, such as multi-party computation, zero-knowledge proofs, oblivious transfer, and voting protocols.
Eighth International Conference on Finite Fields and Applications, July 9-13, 2007, Melbourne, Australia
Author: Gary L. Mullen,Daniel Panario,Igor E. Shparlinski
Publisher: American Mathematical Soc.
This volume contains the proceedings of the Eighth International Conference on Finite Fields and Applications, held in Melbourne, Australia, July 9-13, 2007. It contains 5 invited survey papers as well as original research articles covering various theoretical and applied areas related to finite fields. Finite fields, and the computational and algorithmic aspects of finite field problems, continue to grow in importance and interest in the mathematical and computer science communities because of their applications in so many diverse areas. In particular, finite fields now play very important roles in number theory, algebra, and algebraic geometry, as well as in computer science, statistics, and engineering. Areas of application include algebraic coding theory, cryptology, and combinatorial design theory.
Proceedings of The Fifth International Conference on Finite Fields and Applications Fq 5, held at the University of Augsburg, Germany, August 2–6, 1999
Author: Dieter Jungnickel,H. Niederreiter
Publisher: Springer Science & Business Media
Author: Robert J. McEliece
Publisher: Springer Science & Business Media
Category: Technology & Engineering
This book developed from a course on finite fields I gave at the University of Illinois at Urbana-Champaign in the Spring semester of 1979. The course was taught at the request of an exceptional group of graduate students (includ ing Anselm Blumer, Fred Garber, Evaggelos Geraniotis, Jim Lehnert, Wayne Stark, and Mark Wallace) who had just taken a course on coding theory from me. The theory of finite fields is the mathematical foundation of algebraic coding theory, but in coding theory courses there is never much time to give more than a "Volkswagen" treatment of them. But my 1979 students wanted a "Cadillac" treatment, and this book differs very little from the course I gave in response. Since 1979 I have used a subset of my course notes (correspond ing roughly to Chapters 1-6) as the text for my "Volkswagen" treatment of finite fields whenever I teach coding theory. There is, ironically, no coding theory anywhere in the book! If this book had a longer title it would be "Finite fields, mostly of char acteristic 2, for engineering and computer science applications. " It certainly does not pretend to cover the general theory of finite fields in the profound depth that the recent book of Lidl and Neidereitter (see the Bibliography) does.
Proceedings of the Sixth International Conference on Finite Fields and Applications, held at Oaxaca, México, May 21–25, 2001
Author: Gary L. Mullen,Henning Stichtenoth,Horacio Tapia-Recillas
Publisher: Springer Science & Business Media
Theory and Applications
Author: David S. Gunderson
Publisher: Discrete Mathematics and its Applications
Handbook of Mathematical Induction: Theory and Applications shows how to find and write proofs via mathematical induction. This comprehensive book covers the theory, the structure of the written proof, all standard exercises, and hundreds of application examples from nearly every area of mathematics. In the first part of the book, the author discusses different inductive techniques, including well-ordered sets, basic mathematical induction, strong induction, double induction, infinite descent, downward induction, and several variants. He then introduces ordinals and cardinals, transfinite induction, the axiom of choice, Zorn s lemma, empirical induction, and fallacies and induction. He also explains how to write inductive proofs. The next part contains more than 750 exercises that highlight the levels of difficulty of an inductive proof, the variety of inductive techniques available, and the scope of results provable by mathematical induction. Each self-contained chapter in this section includes the necessary definitions, theory, and notation and covers a range of theorems and problems, from fundamental to very specialized. The final part presents either solutions or hints to the exercises. Slightly longer than what is found in most texts, these solutions provide complete details for every step of the problem-solving process. "