Cargando…

An Introduction to Mathematical Cryptography

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hoffstein, Jeffrey (Autor), Pipher, Jill (Autor), Silverman, Joseph H. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2014.
Edición:2nd ed. 2014.
Colección:Undergraduate Texts in Mathematics,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4939-1711-2
003 DE-He213
005 20220117045125.0
007 cr nn 008mamaa
008 140911s2014 xxu| s |||| 0|eng d
020 |a 9781493917112  |9 978-1-4939-1711-2 
024 7 |a 10.1007/978-1-4939-1711-2  |2 doi 
050 4 |a QA241-247.5 
072 7 |a PBH  |2 bicssc 
072 7 |a MAT022000  |2 bisacsh 
072 7 |a PBH  |2 thema 
082 0 4 |a 512.7  |2 23 
100 1 |a Hoffstein, Jeffrey.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 3 |a An Introduction to Mathematical Cryptography  |h [electronic resource] /  |c by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman. 
250 |a 2nd ed. 2014. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2014. 
300 |a XVII, 538 p. 32 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Undergraduate Texts in Mathematics,  |x 2197-5604 
505 0 |a Preface -- Introduction -- 1 An Introduction to Cryptography -- 2 Discrete Logarithms and Diffie-Hellman -- 3 Integer Factorization and RSA -- 4 Digital Signatures -- 5 Combinatorics, Probability, and Information Theory -- 6 Elliptic Curves and Cryptography -- 7 Lattices and Cryptography -- 8 Additional Topics in Cryptography -- List of Notation -- References -- Index. 
520 |a This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included. 
650 0 |a Number theory. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer science-Mathematics. 
650 0 |a Algebra. 
650 1 4 |a Number Theory. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Cryptology. 
650 2 4 |a Mathematical Applications in Computer Science. 
650 2 4 |a Order, Lattices, Ordered Algebraic Structures. 
700 1 |a Pipher, Jill.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Silverman, Joseph H.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781493917129 
776 0 8 |i Printed edition:  |z 9781493917105 
776 0 8 |i Printed edition:  |z 9781493939381 
830 0 |a Undergraduate Texts in Mathematics,  |x 2197-5604 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4939-1711-2  |z Texto Completo 
912 |a ZDB-2-SMA 
912 |a ZDB-2-SXMS 
950 |a Mathematics and Statistics (SpringerNature-11649) 
950 |a Mathematics and Statistics (R0) (SpringerNature-43713)