Algebra and computer science / [edited by] Delaram Kahrobaei, Bren Cavallo and David Garber.
Material type:
- 9781470423032 (alk. paper)
- 510 23 Am512c
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
Books | ISI Library, Kolkata | 510 Am512c (Browse shelf(Opens below)) | Available | 137638 |
Includes bibliographical references.
* F. Bassino, C. Nicaud, and P. Weil, Generic properties of subgroups of free groups and finite presentations* C. S. Chum and X. Zhang, A new multi-server scheme for private information retrieval* C. S. Chum, B. Fine, A. I. S. Moldenhauer, G. Rosenberger, and X. Zhang, On secret sharing protocols* M. E. Habeeb, A verifiable secret sharing scheme using non-abelian groups* A. Kalka, Non-associative public-key cryptography* A. Kalka and M. Teicher, Non-associative key establishment protocols and their implementation* D. Konig, M. Lohrey, and G. Zetzsche, Knapsack and subset sum problems in nilpotent, polycyclic, and co-context-free groups* I. S. Moldenhauer, G. Rosenberger, and K. Rosenthal, On the Tits alternative for a class of finitely presented groups with a special focus on symbolic computations* A. Sale, Geometry of the conjugacy problem in lamplighter groups* A. Weiss, A logspace solution to the word and conjugacy problem of generalized Baumslag-Solitar groups* S. Yuan, Cryptographic hash functions from sequences of lifted Paley graphs.
This volume contains the proceedings of three special sessions: Algebra and Computer Science, held during the Joint AMS-EMS-SPM meeting in Porto, Portugal, June 10-13, 2015; Groups, Algorithms, and Cryptography, held during the Joint Mathematics Meeting in San Antonio, TX, January 10-13, 2015; and Applications of Algebra to Cryptography, held during the Joint AMS-Israel Mathematical Union meeting in Tel-Aviv, Israel, June 16-19, 2014. Papers contained in this volume address a wide range of topics, from theoretical aspects of algebra, namely group theory, universal algebra and related areas, to applications in several different areas of computer science. From the computational side, the book aims to reflect the rapidly emerging area of algorithmic problems in algebra, their computational complexity and applications, including information security, constraint satisfaction problems, and decision theory. The book gives special attention to recent advances in quantum computing that highlight the need for a variety of new intractability assumptions and have resulted in a new area called group-based cryptography.
There are no comments on this title.