02797cam a2200385 i 45000010009000000050017000090080041000260100017000670200018000840400028001020420008001300500022001380820023001600840045001831000014002282450079002422600030003213000035003514900046003865040051004325201175004836500019016586500023016776500039017006500042017396500045017816500042018267000019018687000019018879060045019069420012019519550154019639990015021179520279021321774488420170607092525.0130520s2013 flua b 001 0 eng a 2013013446 a9781420079463 aDLCbengcDLCerdadDLC apcc00aQA268b.L545 201300a516.352223bLIN-A aMAT036000aCOM053000aMAT0220002bisacsh1 aLing, San10aAlgebraic curves in cryptography cSan Ling, Huaxiong Wang, Chaoping Xing. aNew York :bCRC,c©2013. axvii, 321 p. :bill. ;c25 cm.0 aDiscrete mathematics and its applications aIncludes bibliographical references and index. a"The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves. "-- 0aCoding theory. 0aCurves, Algebraic. 0aData encryption (Computer science) 7aMATHEMATICS / Combinatorics.2bisacsh 7aCOMPUTERS / Security / General.2bisacsh 7aMATHEMATICS / Number Theory.2bisacsh1 aWang, Huaxiong1 aXing, Chaoping a7bcbccorignewd1eecipf20gy-gencatlg 2ddccBK bxh07 2013-05-20ixh07 2013-05-20 ONIX to Deweyaxn09 2013-08-29 1 copy rec'd., to CIP ver.arl00 2013-09-11 to SMAarl06 2014-01-30 to Discard copy 3 c9656d9656 00102ddc406REF_516_352000000000000_LINA708MATH912857aIIITbIIITcREFd2014-03-11g3884.59l1oREF 516.352 LIN-Ap003956r2015-03-09s2015-02-27v£49.99w2014-03-11yBKe1342f2014-03-03jIIITD/LIC/BS/2012/08/73k2014-02-28xIndica Publishers & Distributors Pvt. Ltd.