Lattices Applied to Coding for Reliable and Secure Communications by Sueli I.R. Costa Frédérique Oggier Antonio Campello Jean-Claude Belfiore & Emanuele Viterbo
Author:Sueli I.R. Costa, Frédérique Oggier, Antonio Campello, Jean-Claude Belfiore & Emanuele Viterbo
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
(2)Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore
(3)Department of Electrical and Electronic Engineering, Imperial College London, London, UK
(4)Communications and Electronics Department, Télécom ParisTech, Paris, France
(5)Department of Electrical and Computer Systems Engineering, Monash University, Clayton, VIC, Australia
In Chap. 2, interesting lattices together with their parameters and applications were presented. In Chap. 3, one method to build such lattices was discussed, which consists of obtaining lattices from linear codes. This chapter presents two other methods to construct lattices, both called ideal lattices, because they both rely on the structure of ideals in rings. We recall that given a commutative ring R, an ideal of R is an additive subgroup of R which is also closed under multiplication by elements of R. The same terminology is used for two different viewpoints on lattices because of the communities that studied them. We will explain the first method using quadratic fields and refer to [79] for general number field constructions. We note that such a lattice construction from number fields can in turn be combined with Construction A to obtain further lattices, e.g., [59] and references therein. In the second method, âideal latticesâ refer to a family of lattices recently used in cryptography.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7567)
Robo-Advisor with Python by Aki Ranin(7451)
Offensive Shellcode from Scratch by Rishalin Pillay(6019)
Ego Is the Enemy by Ryan Holiday(4919)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(4851)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4429)
Python for ArcGIS Pro by Silas Toms Bill Parker(4095)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3802)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3518)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3273)
Speed Up Your Python with Rust by Maxwell Flitton(3224)
Liar's Poker by Michael Lewis(3201)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3187)
Extreme DAX by Michiel Rozema & Henk Vlootman(3162)
Agile Security Operations by Hinne Hettema(3113)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3104)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3077)
Cryptography Algorithms by Massimo Bertaccini(2996)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2973)
