Back to overview

Coding Theory

EC8
LocationEindhoven University of Technology
Weeks6 - 21
LectureThursday, 14:00 - 16:45
Provider Discrete Mathematics, Algebra and Number Theory (Diamant)
LinksCourse page (requires login)

Summary

Prerequisites:

Aim of the course:

To become familiar with the standard methods that are used to protect digital data, when they are transmitted (internet, infrared, wireless, etc.), as well as when they are stored on some information carrier (cd, dvd, magnetic tape, hard disc, etc). The data are to be protected against random errors caused by noise, damage, impurities, and so on. To show how one can apply these codes to a public key cryptosystem and secret sharing.

Topics to be discussed are:

If time permits we will survey the following topics (not part of the examination):

Videos and slides of lectures: These lectures will be recorded on video and also the slides are available to participants through the following website: https://oncourse.tue.nl/2018/

and go to Mathematics and then to Coding Theory (2MMC30)

Lecturer

R. Pellikaan (TUe)