04088nam 22006255 450 991025431180332120200702135814.03-319-63931-510.1007/978-3-319-63931-4(CKB)4100000001041471(DE-He213)978-3-319-63931-4(MiAaPQ)EBC5149532(PPN)221253505(EXLCZ)99410000000104147120171115d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierAlgebraic Geometry for Coding Theory and Cryptography IPAM, Los Angeles, CA, February 2016 /edited by Everett W. Howe, Kristin E. Lauter, Judy L. Walker1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XV, 150 p. 8 illus., 2 illus. in color.)Association for Women in Mathematics Series,2364-5733 ;93-319-63930-7 Includes bibliographical references at the end of each chapters.1. Representations of the Multicast Network Problem -- 2. Hypersurfaces in weighted projective spaces over finite fields with applications to coding theory -- 3. Isogenies for point counting on genus two hyperelliptic curves with maximal real multiplication -- 4. Locally recoverable codes from algebraic curves and surfaces -- 5. Variations of the McEliece Cryptosystem.Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference’s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.Association for Women in Mathematics Series,2364-5733 ;9Algebraic geometryComputer science—MathematicsComputer mathematicsData encryption (Computer science)Algebraic Geometryhttps://scigraph.springernature.com/ontologies/product-market-codes/M11019Mathematical Applications in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/M13110Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Algebraic geometry.Computer science—Mathematics.Computer mathematics.Data encryption (Computer science).Algebraic Geometry.Mathematical Applications in Computer Science.Cryptology.516.35Howe Everett Wedthttp://id.loc.gov/vocabulary/relators/edtLauter Kristin Eedthttp://id.loc.gov/vocabulary/relators/edtWalker Judy Ledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910254311803321Algebraic Geometry for Coding Theory and Cryptography1562537UNINA