|
|
|
|
LEADER |
04111nam a22006015i 4500 |
001 |
978-3-540-89994-5 |
003 |
DE-He213 |
005 |
20151204152046.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540899945
|9 978-3-540-89994-5
|
024 |
7 |
|
|a 10.1007/978-3-540-89994-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.0151
|2 23
|
245 |
1 |
0 |
|a Mathematical Methods in Computer Science
|h [electronic resource] :
|b Essays in Memory of Thomas Beth /
|c edited by Jacques Calmet, Willi Geiselmann, Jörn Müller-Quade.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2008.
|
300 |
|
|
|a XII, 191 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5393
|
505 |
0 |
|
|a Cryptography I -- On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries -- Designs -- Steiner t-Designs for Large t -- New Spatial Configurations -- Construction of Large Constant Dimension Codes with a Prescribed Minimum Distance -- Quantum Computing -- Invited Talk: Embedding Classical into Quantum Computation -- A Criterion for Attaining the Welch Bounds with Applications for Mutually Unbiased Bases -- An Efficient Quantum Algorithm for the Hidden Subgroup Problem over Weyl-Heisenberg Groups -- Algorithms -- Computing Equiangular Lines in Complex Space -- Complexity of Comparing Monomials and Two Improvements of the Buchberger-Möller Algorithm -- Coding Theory -- Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy -- Kernel Dimension for Some Families of Quaternary Reed-Muller Codes -- Cryptography II -- Coding-Based Oblivious Transfer -- Protection of Sensitive Security Parameters in Integrated Circuits -- On Reconstruction of RC4 Keys from Internal States.
|
520 |
|
|
|a This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of Thomas Beth. The themes of the conference reflected the many interests of Thomas Beth. Although, these interests might seem diverse, mathematical methods and especially algebra as a language constituted the common denominator of all of his scientific achievements. The 12 contributed talks presented were carefully selected from 30 submissions and cover the topics cryptography, designs, quantum computing, algorithms, and coding theory. Furthermore, this volume contains two invited talks held at the conference. One focuses on the area of coding theory and symbolic computation, an area especially appreciated by Thomas Beth, because it combines algebra and algorithmics. The other one discusses quantum information, which again was a focus of Thomas Beth’s research.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Mathematics of Computing.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Computing Methodologies.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Data Encryption.
|
700 |
1 |
|
|a Calmet, Jacques.
|e editor.
|
700 |
1 |
|
|a Geiselmann, Willi.
|e editor.
|
700 |
1 |
|
|a Müller-Quade, Jörn.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540899938
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5393
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-89994-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|