Download e-book for iPad: Algebraic Function Fields and Codes by Henning Stichtenoth

By Henning Stichtenoth

ISBN-10: 3540768777

ISBN-13: 9783540768777

ISBN-10: 3540768785

ISBN-13: 9783540768784

The conception of algebraic functionality fields has its origins in quantity thought, complicated research (compact Riemann surfaces), and algebraic geometry. when you consider that approximately 1980, functionality fields have stumbled on wonderful functions in different branches of arithmetic similar to coding idea, cryptography, sphere packings and others. the most goal of this booklet is to supply a only algebraic, self-contained and in-depth exposition of the idea of functionality fields.

This re-creation, released within the sequence Graduate Texts in arithmetic, has been significantly accelerated. additionally, the current version comprises a variety of routines. a few of them are rather effortless and aid the reader to appreciate the fundamental fabric. different workouts are extra complex and canopy extra fabric that may now not be incorporated within the text.

This quantity is principally addressed to graduate scholars in arithmetic and theoretical laptop technological know-how, cryptography, coding idea and electric engineering.

Show description

Read Online or Download Algebraic Function Fields and Codes PDF

Similar cryptography books

New PDF release: Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking offers a accomplished survey of up to date multimedia encryption and watermarking recommendations, which allow a safe trade of multimedia highbrow estate. half I, electronic Rights administration (DRM) for Multimedia, introduces DRM strategies and types for multimedia content material security, and provides the major gamers.

Download e-book for iPad: The Information Security Dictionary Defining The Terms That by Urs E. Gattiker

Anything for everybody If this ebook is to be successful and support readers, its cardinal advantage needs to be to supply an easy reference textual content. it's going to be a vital addition to a knowledge safety library. As such it may additionally serve the aim of being a brief refresher for phrases the reader has now not visible because the days while one attended a computing technology application, info safeguard direction or workshop.

Download e-book for kindle: Public Key Cryptography - PKC 2010: 13th International by Phong Q. Nguyen, David Pointcheval

This publication constitutes the refereed complaints of the thirteenth overseas convention on perform and concept in Public Key Cryptography, PKC 2010, held in Paris, France, in could 2010. The 29 revised complete papers awarded have been rigorously reviewed and chosen from one hundred forty five submissions. The papers are prepared in topical sections on encryption; cryptanalysis; protocols; community coding; instruments; elliptic curves; lossy trapdoor capabilities; discrete logarithm; and signatures.

Download e-book for kindle: Post-Quantum Cryptography by Daniel J. Bernstein (auth.), Daniel J. Bernstein, Johannes

Quantum desktops will holiday modern hottest public-key cryptographic structures, together with RSA, DSA, and ECDSA. This ebook introduces the reader to the subsequent new release of cryptographic algorithms, the structures that withstand quantum-computer assaults: particularly, post-quantum public-key encryption platforms and post-quantum public-key signature platforms.

Additional info for Algebraic Function Fields and Codes

Example text

Setting ω := zω0 we obtain vPi (ω) = −1. 7). Again by the Approximation Theorem we find y ∈ F such that vPi (y − ai ) > 0. It follows that vPi (y) = 0 and y(Pi ) = ai . We put η := y −1 ω and obtain vPi (η) = vPi (ω) = −1, and ηPi (1) = ωPi (y −1 ) = y −1 (Pi ) · ωPi (1) = a−1 i · ai = 1 . 10. Let η be a Weil differential such that vPi (η) = −1 and ηPi (1) = 1 for i = 1, . . , n. Then CL (D, G)⊥ = CΩ (D, G) = CL (D, H) with H := D − G + (η) . Proof. 8. Observe that supp (D − G + (η)) ∩ supp D = ∅ since vPi (η) = −1 for i = 1, .

Then there is an element 0 = x ∈ L (G) such that the codeword (x(P1 ), . . , x(Pn )) ∈ CL (D, G)) has precisely n − d = n − d∗ = deg G zero components, say x(Pij ) = 0 for j = 1, . . , deg G. Put deg G D := Pij . j=1 Then 0 ≤ D ≤ D, deg D = deg G and (G − D ) > 0 (as x ∈ L (G − D )). Conversely, if D has the above properties then we choose an element 0 = y ∈ L (G − D ). The weight of the corresponding codeword (y(P1 ), . . , y(Pn )) is n − deg G = d∗ , hence d = d∗ . Another code can be associated with the divisors G and D, by using local components of Weil differentials.

Remark. 6. 12. Let K = IF3 be the field with 3 elements and K(x) the rational function field over K. Show: (i) The polynomial f (T ) = T 2 + x4 − x2 + 1 is irreducible over K(x). (ii) Let F = K(x, y) where y is a zero of the polynomial f (T ) as above, and ˜ be the full constant field of F . Then K ˜ has 9 elements, and F = K(x). 13. Assume that F/K has a place P ∈ IPF of degree one. Show that there exist x, y ∈ F such that [F : K(x)] = [F : K(y)] = 2g + 1 and F = K(x, y). 14. Let V, W be vector spaces over K.

Download PDF sample

Algebraic Function Fields and Codes by Henning Stichtenoth

by Mark

Rated 4.99 of 5 – based on 10 votes