Books of Coding theory

  • Cryptography and Network Security: Principles and Practice
    By William Stallings

    In addition to the potential vulnerability of the various communications links,the various processors along the path are themselves subject to attack.An attack can take the form of attempts to modify the hardware or software,to gain ...

  • Algebraic Geometry Codes: Advanced Chapters
    By Michael Tsfasman, Serge Vlǎduţ, Dmitry Nogin

    p and for d one has the following Tsfasman–Serre-Sørensen bound: d > 0m - (rq”-1 +0m-2) F (q – T -- 1)4"-", which is an immediately corollary of the following fact. THEOREM 11.1.1. If P e Pro, \{0}, r < q+1, then the zero locus SP ={a e&nbsp;...

  • Rank Distance Bicodes and Their Generalization
    By W. B. Vasantha Kandasamy, Florentin Smarandache, N. Suresh Babu

    W. B. Vasantha Kandasamy, Florentin Smarandache, N. Suresh Babu, R.S. Selvaraj. Again, GF(2*) can be considered as a linear space of dimension 'N' over GF(2). Hence an element x e GF(2") has a representation as a N-tuple (oil, Ojo,&nbsp;...

  • Designing with Web Standards
    By Jeffrey Zeldman

    ... while you weren't looking , the result is what you see in Figure 16.10 . 16.10 The sidebar is filled at last . daily report glamorous classics about contact essentials pubs tour abc abc RAPPY COE stu WTRemix Go ! Toggle Externals .

  • 高质量程序设计艺术
    By Diomidis Spinellis, 斯皮内利斯

    本书论述阅读与编写软件代码的方法,重点讨论软件代码的质量属性,包括了软件系统的可靠性、可移植性、可用性、互操作性、适应性、可信性以及可维护性等方面。

  • 代码质量
    By Diomidis Spinellis

    本书重点讨论代码的非功能特性,深入讲述代码如何满足重要的非功能性需求,如可靠性、安全性、可移植性和可维护性,以及时间效率和空间效率。

  • 信息研究论
    By 晓宾·卢

    东北师范大学图书出版基金项目

  • 信息论与编码
    By 陈新, 陈运, 周亮

    本书系统介绍和论述了信息的基本概念;信息论的起源, 发展及研究内容;香农信息论的三个基本概念;信源熵, 信道容量和信息率失真函数, 以及与这三个概念相对应的三个编码定理 ...

  • 信息论与编码
    By 陈新, 陈运, 周亮

    高等学校电子信息科学与工程专业教材

  • Cryptography and Network Security: Principles and Practice
    By William Stallings

    Blocks are labeled .The last block my be null or may contain from 1 to 127 bits.In other words, the input to the XTS-AES algorithm consists of 128-bit blocks and possibly a final partial block. m P 0 , P1, Á , Pm For encryption and&nbsp;...

  • Cryptography and Network Security: Principles and Practice
    By William Stallings

    In this carefully constructed book, Juliet Dusinberre explores Woolf's affinity on many levels with the early modern period and her sense of being reborn though the creation of an alternative tradition of reading and writing whose roots go ...

  • Advances in Cryptology - Eurocrypt '85
    By Franz Pichler

    Advances in Cryptology - Eurocrypt '85

  • In Code: A Mathematical Journey
    By Sarah Flannery, David Flannery

    In this remarkable book, written with her father, her first maths teacher, she writes about her life, mathematics and making codes - and this extraordinary year.

  • Coding for Beginners: Using Python
    By Louie Stowell

    An introduction to coding for complete beginners, this friendly and accessible book will teach children the basics of Python (a widely used programming language), allowing them to get inside the code of their computer and create simple ...

  • Code: The Hidden Language of Computer Hardward and Software

    Code: The Hidden Language of Computer Hardward and Software

  • Algebraic Curves and Cryptography
    By Vijaya Kumar Murty

    ... Gail S. K. Wolkowicz, and Jianhong Wu, Editors, Dynamical systems and their applications in biology, 2003 Yakov Eliashberg, Boris Khesin, and François Lalonde, Editors, Symplectic and contact topology: Interactions and perspectives,&nbsp;...

  • Secret Codes and Number Games: Cryptographic Projects and Number Games for Children Ages 5-16
    By Dev Gualtieri

    It's interesting to learn the basics and understand what's happening "under the hood" of cryptographic applications.This book has a spectrum of content that's interesting to children of all ages.

  • Coding Theory and Quantum Computing: An International Conference on Coding Theory and Quantum Computing, May 20-24, 2003, University of Virginia
    By David Evans

    ... and A. Macintyre, Editors, Analyzable functions and applications, 2005 José Burillo, Sean Cleary, Murray Elder, Jennifer Taback, and Enric Ventura, Editors, Geometric methods in group theory, 2005 Gui-Qiang Chen, George Gasper,&nbsp;...

  • Game Coding Complete
    By David Graham, Mike McShaffry

    This book examines the entire game development process and the unique challenges associated with creating a game.

  • Rank Distance Bicodes and Their Generalization

    Rank Distance Bicodes and Their Generalization