Applied algebra : Codes, ciphers, and discrete algorithms / Darel W. Hardy, Fred Richman, and Carol L. Walker.
By: Hardy, Darel W [Author]
Contributor(s): Walker, Carol L | Richman, Fred
Series: Discrete mathematics and its applications: Publisher: Boca Raton : CRC Press, 2009Edition: Second editionDescription: 410 pages : illustrations ; 24 cmISBN: 9781420071429 (hardcover : alk. paper); 1420071424 (hardcover : alk. paper)Subject(s): Coding theory | Computer security -- MathematicsDDC classification: 003.54 LOC classification: QA268 | .H365 2009Online resources: Table of contents only| Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|
BOOK
|
COLLEGE LIBRARY | COLLEGE LIBRARY SUBJECT REFERENCE | 003.54 H222 2009 (Browse shelf) | Available | CITU-CL-39652 |
Browsing COLLEGE LIBRARY Shelves , Shelving location: SUBJECT REFERENCE Close shelf browser
|
|
|
|
|
|
|
||
| 003.35369 K299 2004 Simulation with Arena / | 003.5 T31 2002 Modern control design with MATLAB and SIMULINK / | 003.52 M919 2010 Pattern theory : The stochastic analysis of real-world signals / | 003.54 H222 2009 Applied algebra : Codes, ciphers, and discrete algorithms / | 003.54 H222 2009 Applied algebra : Codes, ciphers, and discrete algorithms / | 003.54 T143 2007 The black swan : The impact of the highly improbable / | 003.54 T143 2007 The black swan : The impact of the highly improbable / |
"A Chapman & Hall book."
Includes bibliographical references (p. 395-396) and index.
Integers and computer algebra --
Codes --
Euclidean algorithm --
Ciphers --
Error-control codes --
Chinese remainder theorem --
Theorems of Fermat and Euler --
Public key ciphers --
Finite fields --
Error-correcting codes --
Advanced encryption standard --
Polynomial algorithms and fast Fourier transforms --
Appendix A. Topics in algebra and number theory.
Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. While the content has been rework.

BOOK
There are no comments for this item.