An Introduction to Mathematical Cryptography
β Scribed by Jeffrey Hoffstein; Jill Catherine Pipher; Joseph H Silverman
- Book ID
- 127454230
- Publisher
- Springer
- Year
- 2008
- Tongue
- English
- Weight
- 3 MB
- Series
- Undergraduate texts in mathematics
- Edition
- 1st Edition.
- Category
- Library
- City
- [New York ; London]
- ISBN
- 0387779949
No coin nor oath required. For personal study only.
β¦ Synopsis
An Introduction to Mathematical Cryptography provides an introduction to public key cryptography and underlying mathematics that is required for the subject. Each of the eight chapters expands on a specific area of mathematical cryptography and provides an extensive list of exercises. It is a suitable text for advanced students in pure and applied mathematics and computer science, or the book may be used as a self-study. This book also provides a self-contained treatment of mathematical cryptography for the reader with limited mathematical background.
π SIMILAR VOLUMES
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout
This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools su
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.In the first part, this book covers
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. Based on courses taught at T