Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Algebra and computer science / [edited by] Delaram Kahrobaei, Bren Cavallo and David Garber.

By: Contributor(s): Material type: TextTextSeries: Contemporary mathematics ; 677.Publication details: Providence : American Mathematical Society, ©2016.Description: vii, 229 pages : illustrations ; 26 cmISBN:
  • 9781470423032 (alk. paper)
Subject(s): DDC classification:
  • 510 23 Am512c
Contents:
* F. Bassino, C. Nicaud, and P. Weil, Generic properties of subgroups of free groups and finite presentations* C. S. Chum and X. Zhang, A new multi-server scheme for private information retrieval* C. S. Chum, B. Fine, A. I. S. Moldenhauer, G. Rosenberger, and X. Zhang, On secret sharing protocols* M. E. Habeeb, A verifiable secret sharing scheme using non-abelian groups* A. Kalka, Non-associative public-key cryptography* A. Kalka and M. Teicher, Non-associative key establishment protocols and their implementation* D. Konig, M. Lohrey, and G. Zetzsche, Knapsack and subset sum problems in nilpotent, polycyclic, and co-context-free groups* I. S. Moldenhauer, G. Rosenberger, and K. Rosenthal, On the Tits alternative for a class of finitely presented groups with a special focus on symbolic computations* A. Sale, Geometry of the conjugacy problem in lamplighter groups* A. Weiss, A logspace solution to the word and conjugacy problem of generalized Baumslag-Solitar groups* S. Yuan, Cryptographic hash functions from sequences of lifted Paley graphs.
Summary: This volume contains the proceedings of three special sessions: Algebra and Computer Science, held during the Joint AMS-EMS-SPM meeting in Porto, Portugal, June 10-13, 2015; Groups, Algorithms, and Cryptography, held during the Joint Mathematics Meeting in San Antonio, TX, January 10-13, 2015; and Applications of Algebra to Cryptography, held during the Joint AMS-Israel Mathematical Union meeting in Tel-Aviv, Israel, June 16-19, 2014. Papers contained in this volume address a wide range of topics, from theoretical aspects of algebra, namely group theory, universal algebra and related areas, to applications in several different areas of computer science. From the computational side, the book aims to reflect the rapidly emerging area of algorithmic problems in algebra, their computational complexity and applications, including information security, constraint satisfaction problems, and decision theory. The book gives special attention to recent advances in quantum computing that highlight the need for a variety of new intractability assumptions and have resulted in a new area called group-based cryptography.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books ISI Library, Kolkata 510 Am512c (Browse shelf(Opens below)) Available 137638
Total holds: 0

Includes bibliographical references.

* F. Bassino, C. Nicaud, and P. Weil, Generic properties of subgroups of free groups and finite presentations* C. S. Chum and X. Zhang, A new multi-server scheme for private information retrieval* C. S. Chum, B. Fine, A. I. S. Moldenhauer, G. Rosenberger, and X. Zhang, On secret sharing protocols* M. E. Habeeb, A verifiable secret sharing scheme using non-abelian groups* A. Kalka, Non-associative public-key cryptography* A. Kalka and M. Teicher, Non-associative key establishment protocols and their implementation* D. Konig, M. Lohrey, and G. Zetzsche, Knapsack and subset sum problems in nilpotent, polycyclic, and co-context-free groups* I. S. Moldenhauer, G. Rosenberger, and K. Rosenthal, On the Tits alternative for a class of finitely presented groups with a special focus on symbolic computations* A. Sale, Geometry of the conjugacy problem in lamplighter groups* A. Weiss, A logspace solution to the word and conjugacy problem of generalized Baumslag-Solitar groups* S. Yuan, Cryptographic hash functions from sequences of lifted Paley graphs.

This volume contains the proceedings of three special sessions: Algebra and Computer Science, held during the Joint AMS-EMS-SPM meeting in Porto, Portugal, June 10-13, 2015; Groups, Algorithms, and Cryptography, held during the Joint Mathematics Meeting in San Antonio, TX, January 10-13, 2015; and Applications of Algebra to Cryptography, held during the Joint AMS-Israel Mathematical Union meeting in Tel-Aviv, Israel, June 16-19, 2014. Papers contained in this volume address a wide range of topics, from theoretical aspects of algebra, namely group theory, universal algebra and related areas, to applications in several different areas of computer science. From the computational side, the book aims to reflect the rapidly emerging area of algorithmic problems in algebra, their computational complexity and applications, including information security, constraint satisfaction problems, and decision theory. The book gives special attention to recent advances in quantum computing that highlight the need for a variety of new intractability assumptions and have resulted in a new area called group-based cryptography.

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in