Hiding Data - Selected Topics Hiding Data - Selected Topics
‫الكتاب رقم ‫12‬‬ - Foundations in Signal Processing, Communications and Networking

Hiding Data - Selected Topics

Rudolf Ahlswede’s Lectures on Information Theory 3

Rudolf Ahlswede والمزيد
    • ‏84٫99 US$
    • ‏84٫99 US$

وصف الناشر

Devoted to information security, this volume begins with a short course on cryptography, mainly based
on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid
1990s. It was the second of his cycle of lectures on information theory which
opened with an introductory course on basic coding theorems, as covered in
Volume 1 of this series. In this third volume, Shannon’s historical work on
secrecy systems is detailed, followed by an introduction to an
information-theoretic model of wiretap channels, and such important concepts as
homophonic coding and authentication. Once the theoretical arguments have been
presented, comprehensive technical details of AES are given. Furthermore, a
short introduction to the history of public-key cryptology, RSA and El Gamal
cryptosystems is provided, followed by a look at the basic theory of elliptic
curves, and algorithms for efficient addition in elliptic curves. Lastly, the
important topic of “oblivious transfer” is discussed, which is strongly
connected to the privacy problem in communication. Today, the importance of
this problem is rapidly increasing, and further research and practical realizations
are greatly anticipated.

This is the third of several volumes serving as the
collected documentation of Rudolf Ahlswede’s lectures on information theory.
Each volume includes comments from an invited well-known expert. In the
supplement to the present volume, Rüdiger Reischuk contributes his insights.

Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presentedin this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.

النوع
علم وطبيعة
تاريخ النشر
٢٠١٦
١٨ أبريل
اللغة
EN
الإنجليزية
عدد الصفحات
٣٧٠
الناشر
Springer International Publishing
البائع
Springer Nature B.V.
الحجم
٩٫٢
‫م.ب.‬
Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing
٢٠٢٠
Mathematics and Computing 2013 Mathematics and Computing 2013
٢٠١٤
Logic, Language, and Security Logic, Language, and Security
٢٠٢٠
An Introduction to Single-User Information Theory An Introduction to Single-User Information Theory
٢٠١٨
Theory and Applications of Satisfiability Testing - SAT 2007 Theory and Applications of Satisfiability Testing - SAT 2007
٢٠٠٧
Applications of Mathematics and Informatics in Science and Engineering Applications of Mathematics and Informatics in Science and Engineering
٢٠١٤
Identification and Other Probabilistic Models Identification and Other Probabilistic Models
٢٠٢١
Combinatorial Methods and Models Combinatorial Methods and Models
٢٠١٧
Transmitting and Gaining Data Transmitting and Gaining Data
٢٠١٤
Storing and Transmitting Data Storing and Transmitting Data
٢٠١٤
Lectures on Advances in Combinatorics Lectures on Advances in Combinatorics
٢٠٠٨
Combinatorial Methods and Models Combinatorial Methods and Models
٢٠١٧
Submodular Rate Region Models for Multicast Communication in Wireless Networks Submodular Rate Region Models for Multicast Communication in Wireless Networks
٢٠١٧
Identification and Other Probabilistic Models Identification and Other Probabilistic Models
٢٠٢١
Statistical Robust Beamforming for Broadcast Channels and Applications in Satellite Communication Statistical Robust Beamforming for Broadcast Channels and Applications in Satellite Communication
٢٠١٩
Linear Estimation and Detection in Krylov Subspaces Linear Estimation and Detection in Krylov Subspaces
٢٠٠٧
Robust Signal Processing for Wireless Communications Robust Signal Processing for Wireless Communications
٢٠٠٧