Amazon cover image
Image from Amazon.com

Foundations of coding : compression, encryption, errorcorrection / Jean-Guillaume Dumas, Jean-Louis Roch, Eric Tannier, Sebastien Varrette.

By: Contributor(s): Material type: TextTextPublisher: Hoboken, New Jersey : Wiley, [2015]Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781118960868
  • 1118960866
  • 9781118960523
  • 1118960521
  • 9781119005940
  • 1119005949
  • 1118881443
  • 9781118881446
Subject(s): Genre/Form: Additional physical formats: Print version:: Foundations of coding.DDC classification:
  • 003/.54 23
LOC classification:
  • TK5102.92
Online resources:
Contents:
Title Page; Copyright; List of Figures, Tables, Algorithms and Acronyms; Foreword; Introduction; Chapter 1: Foundations of Coding; 1.1 From Julius Caesar to Telecopy; 1.2 Stream Ciphers and Probabilities; 1.3 Block Ciphers, Algebra, and Arithmetic; 1.4 Decoding, Decryption, Attacks; Chapter 2: Information Theory and Compression; 2.1 Information Theory; 2.2 Statistical Encoding; 2.3 Heuristics of Entropy Reduction; 2.4 Common Compression Codes; 2.5 Lossy Compression; Chapter 3: Cryptology; 3.1 General Principles; 3.2 Secret Key Cryptography; 3.3 Key Exchange; 3.4 Public Key Cryptography
3.5 Authentication, Integrity, Nonrepudiation, Signatures3.6 Key Management; Chapter 4: Error Detection and Correction; 4.1 Principle of Error Detection and Error Correction; 4.2 Error Detection by Parity-CRC Codes; 4.3 Distance of a Code; 4.4 Linear Codes and Cyclic Codes; 4.6 Convolutional Codes and Turbo Codes; Compression, Encryption, Correction: As a Conclusion; Problem Solutions; Solutions for Chapter 1; Solutions for Chapter 2; Solutions for Chapter 3; Solutions for Chapter 4; SOLUTION FOR THE "CASINO" EXERCISE; Bibliography; Index; End User License Agreement
Summary: "This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic developments which led to the structure of code. After discussing the general foundations of code, chapters proceed to cover individual topics such as notions of compression, cryptography, detection, and correction codes. Both classical coding theories and the most cutting-edge models are addressed, along with helpful exercises of varying complexities to enhance comprehension." -- Portion of summary from book.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

Print version record and CIP data provided by publisher.

"This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic developments which led to the structure of code. After discussing the general foundations of code, chapters proceed to cover individual topics such as notions of compression, cryptography, detection, and correction codes. Both classical coding theories and the most cutting-edge models are addressed, along with helpful exercises of varying complexities to enhance comprehension." -- Portion of summary from book.

Title Page; Copyright; List of Figures, Tables, Algorithms and Acronyms; Foreword; Introduction; Chapter 1: Foundations of Coding; 1.1 From Julius Caesar to Telecopy; 1.2 Stream Ciphers and Probabilities; 1.3 Block Ciphers, Algebra, and Arithmetic; 1.4 Decoding, Decryption, Attacks; Chapter 2: Information Theory and Compression; 2.1 Information Theory; 2.2 Statistical Encoding; 2.3 Heuristics of Entropy Reduction; 2.4 Common Compression Codes; 2.5 Lossy Compression; Chapter 3: Cryptology; 3.1 General Principles; 3.2 Secret Key Cryptography; 3.3 Key Exchange; 3.4 Public Key Cryptography

3.5 Authentication, Integrity, Nonrepudiation, Signatures3.6 Key Management; Chapter 4: Error Detection and Correction; 4.1 Principle of Error Detection and Error Correction; 4.2 Error Detection by Parity-CRC Codes; 4.3 Distance of a Code; 4.4 Linear Codes and Cyclic Codes; 4.6 Convolutional Codes and Turbo Codes; Compression, Encryption, Correction: As a Conclusion; Problem Solutions; Solutions for Chapter 1; Solutions for Chapter 2; Solutions for Chapter 3; Solutions for Chapter 4; SOLUTION FOR THE "CASINO" EXERCISE; Bibliography; Index; End User License Agreement