Coding Theory and Cryptography

Large book cover: Coding Theory and Cryptography

Coding Theory and Cryptography

Publisher: Springer
ISBN/ASIN: 3540663363
ISBN-13: 9783540663362
Number of pages: 256

This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. Some of these papers are expository, whereas others are the result of original research. There are both, historical and mathematical papers on cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
Book cover: Foundations of CryptographyFoundations of Cryptography
by - Cambridge University Press
The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.
Book cover: Cracking Codes with PythonCracking Codes with Python
by - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
Book cover: Lecture Notes on CryptographyLecture Notes on Cryptography
This is a set of lecture notes on cryptography for a one week long course on cryptography taught at MIT. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.