Preface: geometry, combinatorial designs and cryptology

نویسندگان

  • Arrigo Bonisoli
  • James W. P. Hirschfeld
  • Spyros S. Magliveras
چکیده

This issue of the journal is devoted to the themes of Geometry, Combinatorial Designs and Cryptology. The guest editors selected sixteen contributions covering various areas within these themes, ranging from public-key cryptography to matters related to key distribution and authentication, from problems in graph theory to resolvability issues in designs, from finite projective planes to higher-dimensional geometries.Many problems in these areas share commonmethods, including purely combinatorial techniques, but also algebraic methods for finite fields, geometric issues mainly involving incidence and collineations, and computational approaches. The papers “Projective k-arcs and 2-level secret-sharing schemes” by Korchmáros– Lanzone–Sonnino (doi:10.1007/s10623-011-9562-5), “Singer 8-arcs of Mathon type in PG(2, 27)” by De Clerck–De Winter–Maes (doi:10.1007/s10623-011-9502-4) and “42arcs in PG(2, q) left invariant by P SL(2, 7)” by Indaco–Korchmáros (doi:10.1007/ s10623-011-9532-y) deal with arcs and address questions related to their construction, maximality and classification up to projective equivalence. Polar spaces are the subject of the papers “Two forms related to the symplectic dual polar space in odd characteristic” by Cardinali–Pasini (doi:10.1007/s10623-011-9545-6) and “Collineations of polar spaces with restricted displacements” by Temmermans–Thas– Van Maldeghem (doi:10.1007/s10623-011-9509-x). In particular the description of these spaces in terms of forms and properties of their collineations are considered.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited

A Sensor Node in Wireless Sensor Network has very limited resources such as processing capability, memory capacity, battery power, and communication capability. When the communication between any two sensor nodes are required to be secured, the symmetric key cryptography technique is used for its advantage over public key cryptography in terms of requirement of less resources. Keys are predistr...

متن کامل

On Squashed Designs

Extremal problems and the existence of designs is investigated in a new type of combinatorial structures, called squashed geometries.

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

A convex combinatorial property of compact sets in the plane and its roots in lattice theory

K. Adaricheva and M. Bolat have recently proved that if $,mathcal U_0$ and $,mathcal U_1$ are circles in a triangle with vertices $A_0,A_1,A_2$, then there exist $jin {0,1,2}$ and $kin{0,1}$ such that $,mathcal U_{1-k}$ is included in the convex hull of $,mathcal U_kcup({A_0,A_1, A_2}setminus{A_j})$. One could say disks instead of circles.Here we prove the existence of such a $j$ and $k$ ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 64  شماره 

صفحات  -

تاریخ انتشار 2012