CIMPA School of Number Theory in Cryptography and Its Applications
نویسنده
چکیده
0.1 Group theory . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 0.2 Ring theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 0.3 Field theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 0.4 Arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 0.4.1 Residue classes modulo n . . . . . . . . . . . . . . . . 8 0.4.2 The ring Z[X] . . . . . . . . . . . . . . . . . . . . . . 9 0.4.3 Möbius inversion formula . . . . . . . . . . . . . . . . 10
منابع مشابه
2 5 Se p 20 09 SEMIDEFINITE PROGRAMMING , HARMONIC ANALYSIS AND CODING THEORY
These lecture notes where presented as a course of the CIMPA summer school in Manila, July 20-30, 2009, Semidefinite programming in algebraic combinatorics. CONTENTS
متن کاملSemidefinite programming, harmonic analysis and coding theory
These lecture notes where presented as a course of the CIMPA summer school in Manila, July 20-30, 2009, Semidefinite programming in algebraic combinatorics. CONTENTS
متن کاملAn introduction to residues and resultants
These notes correspond to one of the introductory courses for the CIMPA Graduate School on Systems of Polynomial Equations to be held in Buenos Aires, Argentina, in July 2003. We present an elementary introduction to univariate residues and resultants, and we outline some of their multivariate generalizations and applications.
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملImproving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010