Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics
Logo des RICAM
  • Login
  • Internal
  • RSS
    • DE
    • EN
  • Institute
    • About
    • Jobs
    • Contact
    • Links
    • Scientific Advisory Board
  • News & Events
    • News
    • Events
    • Event Series
    • Special Semesters
  • People
    • Current members
    • Former Members
  • Research
    • Research Groups
    • Projects
  • Publications
    • RICAM Publications
    • Preprints
    • Lectures
    • Annual Reports
    • Radon Series
    • ETNA
  • HPC
  • Login
  • Internal
  • RSS
    • DE
    • EN

Research

  • Research Groups
    • Computational Methods for PDEs
      • Team
      • Research Topics
      • Projects
      • Publications
    • Inverse Problems and Mathematical Imaging
      • Team
      • Research Topics
      • Projects
      • Publications
      • Editorial Board Memberships
    • Mathematical Data Science
      • Team
      • Publications
    • Mathematical Methods in Medicine and Life Sciences
      • Team
      • Projects
      • Publications
    • Optimization and Optimal Control
      • Team
      • Projects
      • Publications
    • Symbolic Computation
      • Team
      • Research Topics
      • Projects
      • Publications
    • Transfer Group
      • Team
      • Projects
      • Publications
    • Applied Discrete Mathematics and Cryptography
      • Team
      • Research Topics
      • Projects
      • Highlights
      • Publications
      • Editorial Board Memberships
    • Geometry in Simulations
      • Team
      • Research Topics
      • Projects
      • Publications
    • Multivariate Algorithms and Quasi-Monte Carlo Methods
      • Team
      • Research Topics
      • Highlights
      • Publications
      • Projects
  • Projects
    • Completed Projects
  • RICAM
  • Research
  • Research Groups
  • Applied Discrete Mathematics and Cryptography
    • Research Topics
    • Team
    • Research Topics
    • Projects
    • Highlights
    • Publications
    • Editorial Board Memberships

Applied Discrete Mathematics and Cryptography - Research Topics

Monte Carlo Methods and Pseudorandom Numbers

Monte Carlo Methods and Pseudorandom Numbers

Monte Carlo methods are a broad class of algorithms using random sampling to obtain numerical results. An example is the approximation of a (higher-dimensional) integral by the average function value over a set of randomly chosen points. In the computational practice of Monte Carlo methods, the required random numbers and random points are actually generated by the computer in a deterministic subroutine. In this case of deterministic generation, we speak of pseudorandom numbers. The quality of pseudorandom numbers depends on their applications. For example, we need different numbers for numerical integration than for cryptographic applications. For the first application uniform distribution is the most desirable feature whereas for the latter we need unpredictable sequences of numbers.
For an introduction to this area see [1, Chapters 4 and 5]. Contemporary expository treatments of Monte Carlo methods can be found in the books of Dick and Pillichshammer [2], Leobacher and Pillichshammer [3], and Niederreiter [4].

[1] H. Niederreiter, A. Winterhof, Applied Number Theory. Springer (2015).
[2] J. Dick and F. Pillichshammer, Digital Nets and Sequences: Discrepancy Theory and Quasi-Monte Carlo Integration, Cambridge University Press, Cambridge, 2010.
[3] G. Leobacher and F. Pillichshammer, Introduction to Quasi-Monte Carlo Integration and Applications, Birkhhäuser and Springer International, Heidelberg, 2014.
[4] H. Niederreiter, Random Number Generation and Quasi-Monte Carlo Methods, SIAM, Philadelphia, 1992.

Cryptology

Cryptology

Cryptology in the modern sense is the theory of data security and data integrity. Cryptology as a practical craft can be traced back several thousand years as it was already used in one form or other in the ancient civilizations of Egypt, Mesopotamia, China, Greece, and Rome.
A systematic account of the history of cryptology up to 1967 is given in the book of Kahn [1]. The more recent treatment by Singh [2] offers very stimulating reading. For a first course see [3, Chapter 2]. A milestone is the Handbook of Applied Cryptography edited by Menezes, van Oorschot, and Vanstone [4] which may be regarded as the encyclopedia of cryptography.

[1] D. Kahn, The Codebreakers, Macmillan Publishing Company, New York, 1967.
[2] S. Singh, The Code Book, Doubleday, New York, 1999.
[3] H. Niederreiter, A. Winterhof, Applied Number Theory. Springer (2015).
[4] A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.

Finite Fields

Finite Fields

The theory of finite fields is not related to agriculture as the name may suggest, but an area of abstract algebra which is about as important as group theory and even much more important in view of applications such as cryptography, coding theory, and wireless communication.
For an introduction to the theory of finite fields see [1]. The Handbook of Finite Fields [2] gives a complete account of the state-of- the-art theoretical and applied topics in finite fields.

[1] R. Lidl and H. Niederreiter, Introduction to Finite Fields and Their Applications, revised ed., Cambridge University Press, Cambridge, 1994.
[2] G.L. Mullen and D. Panario (eds.), Handbook of Finite Fields, CRC Press, Boca Raton, FL, 2013.

Applied Algebra and Number Theory

Applied Algebra and Number Theory

Number theory is the theory of integers and related mathematical structures and was called the Queen of Mathematics by Carl-Friedrich Gauss. It has always been considered a very beautiful field of mathematics. While only very few real-life applications were known in the past, today number theory can be found in everyday life: in supermarket bar code scanners, in GPS systems, in online banking, etc.
Modern algebra deals with abstract structures such as groups, rings, fields, modules, vector spaces, etc. Algebra is very beautiful as well and its application areas intersect highly with those of number theory. We mention only coding theory and cryptography.
For introductions to Applied Algebra and Applied Number Theory we refer to [1,2].

[1] R. Lidl, G. Pilz, Applied Abstract Algebra, Springer 1998.
[2] H. Niederreiter, A. Winterhof, Applied Number Theory. Springer (2015).

Coding Theory

Coding Theory

Life is a comedy of errors, at least in the opinion of William Shakespeare, but you can make a concentrated effort to reduce the number of errors that you commit and thus increase the quality of your life. There is probably no panacea for all human errors and mishaps, but in the setting of communication technology, number theory and finite fields can help to prevent errors and ensure the quality of communication.
In simple terms, a coding scheme is an algorithm and/or a device for detecting and correcting transmission errors that occur in noisy channels. For a first course see for example [1, Chapter 3]. Milestones in the expository literature on coding theory are the book of MacWilliams and Sloane [2] and the Handbook of Coding Theory edited by Pless and Huffman [3].

[1] H. Niederreiter, A. Winterhof, Applied Number Theory. Springer (2015).
[2] F.J. MacWilliams and N.J.A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, 1977.
[3] V.S. Pless and W.C. Huffman (eds.), Handbook of Coding Theory, Elsevier, Amsterdam, 1998.

Back
share

RICAM

Johann Radon Institute for Computational and Applied Mathematics
of the Austrian Academy of Sciences

Altenberger Straße 69
4040 Linz, Austria

T: +43 732 2468 - 5222
office(at)ricam.oeaw.ac.at

 

QUICKLINKS

  • News
  • Events
  • Jobs
  • Contact
  • Internal
© Copyright OEAW Imprint Data Protection Accessibility
Notice about cookies

This site uses cookies. They ensure essential functionalities of the website and enable us to continuously optimize content. Help us by agreeing to the collection of statistical data and the presentation of external multimedia content. You can change your cookie settings at any time. Further information can be found in the privacy settings and by clicking the Data Protection Link.

Necessary

These cookies are required for the smooth functioning of our website.

NamePurposeStorage durationTypeProvider
CookieConsent Remembers your consent to the use of cookies. 1 year HTML Web Consent
fe_typo_user Assigns your browser to a session on the server. This only affects the content you see and is not evaluated or processed by us - HTTP Web User
Statistics

With the help of these cookies, we strive to make our offer even more attractive for you. The user flow can be analyzed and assessed using pseudonymised data from website users. This gives us the opportunity to optimize website content.

NamePurposeStorage durationTypeProvider
_pk_id Used to store a few details about the user like unique visitor ID. 13 months HTML Matomo-id
_pk_ref Used to store information about the user's referring website. 6 months HTML Matomo-ref
_pk_ses Short-term cookie to save temporary data from the visit. 30 minutes HTML Matomo-ses
_pk_cvar Short-term cookie to save temporary data from the visit. 30 minutes HTML Matomo-cvar
_pk_hsr Short lived cookie used to temporarily store data for the visit. 30 minutes HTML Matomo
Multimedia

With the help of these cookies, we strive to improve the information we offer users by providing multimedia or interactive content such as videos.

NamePurposeStorage durationTypeProvider
YouTube A connection to YouTube will be established to view videos. - Connection YouTube
SoundCloud A connection to SoundCloud will be established to play audio files. - Connection SoundCloud
Twitter A connection to Twitter will be established to display tweets. - missing translation: type. Twitter