tailieunhanh - LECTURE NOTES SERIES Institute for Mathematical Sciences, National University of Singapore

The Institute for Mathematical Sciences at the National University of Singapore was established on 1 July 2000 with funding from the Ministry of Education and the University. Its mission is to provide an international center of excellence in mathematical research and, in particular, to promote within Singapore and the region active research in the mathematical sciences and their applications. It seeks to serve as a focal point for scientists of diverse backgrounds to interact and collaborate in research through tutorials, workshops, seminars and informal discussions | Published by World Scientific Publishing Co. Pte. Ltd. P O Box 128 Farrer Road Singapore 912805 USA office Suite 1B 1060 Main Street River Edge NJ 07661 UK office 57 Shelton Street Covent Garden London WC2H 9HE British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. CODING THEORY AND CRYPTOLOGY Copyright 2002 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book or parts thereof may not be reproduced in any form or by any means electronic or mechanical including photocopying recording or any information storage and retrieval system now known or to be invented without written permission from the Publisher. For photocopying of material in this volume please pay a copying fee through the Copyright Clearance Center Inc. 222 Rosewood Drive Danvers MA 01923 USA. In this case permission to photocopy is not required from the publisher. ISBN 981-238-132-5 Printed in Singapore. LECTURE NOTES SERIES Institute for Mathematical Sciences National University of Singapore Series Editors Louis H. Y Chen and Yeneng Sun Institute for Mathematical Sciences National University of Singapore Published Vol. 1 Coding Theory and Cryptology edited by Harald Niederreiter Contents Foreword vii Preface ix Extremal Problems of Coding Theory A. Barg 1 Analysis and Design Issues for Synchronous Stream Ciphers E. Dawson and L. Simpson 49 Quantum Error-Correcting Codes K. Feng 91 Public Key Infrastructures D. Gollmann 143 Computational Methods in Public Key Cryptology A. K. Lenstra 175 Detecting and Revoking Compromised Keys T. Matsumoto 239 Algebraic Function Fields Over Finite Fields H. Niederreiter 259 Authentication Schemes D. Y. Pei 283 Exponential Sums in Coding Theory Cryptology and Algorithms I. E. Shparlinski 323

TỪ KHÓA LIÊN QUAN