Advances in Mathematics of Communications
AMC is adopting the online editorial system EditFlow, a system used by all journals of the American Math Society.
To view instructions for guest editors of special issue click here
AMC's goal is to attract high quality, original contributions in the general area of Mathematics of Communication. It welcomes mathematical papers that address problems motivated by communications applications such as transmission, storage, and protection of digital (classical or quantum) information. Apart from coding theory, information theory, and mathematical cryptology, problems of this kind arise in many diverse areas of fundamental and applicable mathematics.
A prime objective of AMC is to provide a forum for applied research in these areas. Significant practical and theoretical problems in these areas should be addressed to advance theory and methods of Mathematics of Communications. This will lead to the discovery of new theoretical approaches and clever solutions for practical problems in Communications Technology.
Aim and Scope
The following list of keywords, though incomplete, may help to define the scope more precisely.
Foundations: Algebraic Number Theory: Algebraic Number Fields, Elliptic Curves. Commutative Algebra: Finite Fields, Algebraic Geometry, Groebner Bases. Non-Commutative Algebra: Ring and Module Theory, Finite Rings. Finite Geometry and Algebraic Combinatorics: Incidence Structures, Block Designs, Association Schemes.
Reliable Communication: Algebraic Coding Theory: Codes over Finite Fields and Rings, Lattices. Coding and Geometry: Codes from Designs, Algebraic Geometry Codes. Codes from Graphs: LDPC Codes. Decoding Algorithms: Belief Propagation, List Decoding. Pseudo-Random Sequences: Periodic and Aperiodic Correlation Properties, Merit Factor Problem.
Secure Communication: Public Key Cryptography: Elliptic Curve Cryptography, Digital Signatures. Private Key Cryptography: APN Functions, Boolean Functions. Cryptanalysis: Linear and Differential Cryptanalysis, Algebraic Attacks. Provable Security: Quantum Cryptography. Cryptographic Algorithms and Complexity: Factoring, Discrete Logarithm.
Each paper will be assigned by Professor Marcus Greferath (EiC) to an Associate Editor (AE). The EiC, in consultation with the AE, will reject the paper if he does not think that the paper should enter into the formal reviewing process. Otherwise, the AE will send it out for external review by requesting at least two independent reports within eight weeks of submission. Once the AE has collected two (or more) reports, the AE will provide the EiC with a final assessment of paper quality and recommendation (accept, minor revision, major revision, reject). AMC will then communicate the final decision to authors. In the case of a major revision, papers will undergo a second round of review with similar procedure. When the paper is finally accepted, the EiC will send the formal acceptance letter to the corresponding author.
Add your name and e-mail address to receive news of forthcoming issues of this journal:
[Back to Top]