Number theory in science and communication. With applications in cryptography, physics, biology, digital information, and computing

From MaRDI portal
Publication:795078

zbMath0542.10001MaRDI QIDQ795078

Manfred R. Schroeder

Publication date: 1984

Published in: Springer Series in Information Sciences (Search for Journal in Brave)




Related Items

A complete decoding algorithm for double-error-correcting primitive binary BCH codes of odd \(m\), Finite linear spaces, plane geometries, Hilbert spaces and finite phase space, On relatively prime numbers and oil drops, Representing the integers with powers of 2 and 3., Is AB = I, BA = I not equivalent to AB = BA = I?, On Polynomials with Low Peak Signal to Power (L to L 2 Norm) Ratios and Theorems of Kashin and Spencer, Legendre G‐array pairs and the theoretical unification of several G‐array families, Weil sums of binomials, three-level cross-correlation, and a conjecture of Helleseth, An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy, Coarse-grained properties of the chaotic trajectories in the stadium, The norm ratio of the polynomials with coefficients as binary sequence, Partially unbiased entangled bases, Search for the maximum of a random walk, Complementary results on the search of primes from lesser primes, Chaos, number theory, and computers, Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme, Hadamard ideals and Hadamard matrices with two circulant cores, Representations of cyclic groups acting on complete simplicial fans, A standard perspective on ghosts, The systems of primitive roots the degree and rank of prime numbers, On the construction of \(E(s^2)\)-optimal supersaturated designs, The number theoretical method in response analysis of nonlinear stochastic structures, Summa characteristicaand the Riemann hypothesis: scaling Riemann’s mountain, Chaos and continued fractions, Srinivasa Ramanujan and signal-processing problems, Number theory and the real world, A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs