This monograph presents a comprehensive treatment of recent results on algebraic geometry as they apply to coding theory and cryptography, with the goal the study of algebraic curves and varieties with many rational points. They book surveys recent developments on abelian varieties, in particular the classification of abelian surfaces, hyperelliptic curves, modular towers, Kloosterman curves and codes, Shimura curves and modular jacobian surfaces. Applications of abelian varieties to cryptography are presented including a discussion of hyperelliptic curve cryptosystems. The inter-relationship of codes and curves is developed building on Goppa's results on algebraic-geometry cods. The volume provides a source book of examples with relationsh...
The theory of algebraic function fields over finite fields has its origins in number theory. However...
A part of this thesis, at the interface between Computer Science and Mathematics, is dedicated to th...
The development of new computational techniques and better computing power has made it possible to a...
This volume contains a collection of papers on algebraic curves and their applications. While algebr...
About ten years ago, V.D. Goppa found a surprising connection between the theory of algebraic curves...
When information is transmitted, errors are likely to occur. Coding theory examines efficient ways o...
Algebraic Geometry Codes: Advanced Chapters is devoted to the theory of algebraic geometry codes, a ...
This textbook equips graduate students and advanced undergraduates with the necessary theoretical to...
Abstract. Code-based cryptography is an interesting alternative to clas-sic number-theory PKC since ...
Code-based cryptography is an interesting alternative to classic number-theoretic public key cryptos...
It is by now a well-known paradigm that public-key cryptosystems can be built using finite Abelian g...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
In both algebraic geometry and coding theory, there is a great deal of interest in finding curves wi...
Cryptosystems based on hyperelliptic curves were first presented by N. Koblitz, in 1989 (c.f. [11])....
A part of this thesis, at the interface between Computer Science and Mathematics, is dedicated to th...
The theory of algebraic function fields over finite fields has its origins in number theory. However...
A part of this thesis, at the interface between Computer Science and Mathematics, is dedicated to th...
The development of new computational techniques and better computing power has made it possible to a...
This volume contains a collection of papers on algebraic curves and their applications. While algebr...
About ten years ago, V.D. Goppa found a surprising connection between the theory of algebraic curves...
When information is transmitted, errors are likely to occur. Coding theory examines efficient ways o...
Algebraic Geometry Codes: Advanced Chapters is devoted to the theory of algebraic geometry codes, a ...
This textbook equips graduate students and advanced undergraduates with the necessary theoretical to...
Abstract. Code-based cryptography is an interesting alternative to clas-sic number-theory PKC since ...
Code-based cryptography is an interesting alternative to classic number-theoretic public key cryptos...
It is by now a well-known paradigm that public-key cryptosystems can be built using finite Abelian g...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
In both algebraic geometry and coding theory, there is a great deal of interest in finding curves wi...
Cryptosystems based on hyperelliptic curves were first presented by N. Koblitz, in 1989 (c.f. [11])....
A part of this thesis, at the interface between Computer Science and Mathematics, is dedicated to th...
The theory of algebraic function fields over finite fields has its origins in number theory. However...
A part of this thesis, at the interface between Computer Science and Mathematics, is dedicated to th...
The development of new computational techniques and better computing power has made it possible to a...