A course in mathematical cryptography /

Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by th...

Full description

Saved in:
Bibliographic Details
Corporate Authors: De Gruyter.
Group Author: Fine, Benjamin.; Kreuzer, Martin.; Rosenberger, Gerhard
Published: De Gruyter,
Publisher Address: Berlin ;Boston :
Publication Dates: [2015]
©2015
Literature type: eBook
Language: English
Series: De gruyter textbook
Subjects:
Online Access: http://dx.doi.org/10.1515/9783110372779
http://www.degruyter.com/doc/cover/9783110372779.jpg
Summary: Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gr bner Basis Methods in Cryptography Lattice-Based Cryptography
Carrier Form: 1 online resource (389 pages).
ISBN: 9783110372779
Index Number: QA268
CLC: O157.4
Contents: Frontmatter --
Preface --
Contents --
1. Basic Ideas of Cryptography --
2. Symmetric Key Cryptosystems --
3. Cryptanalysis and Complexity --
4. Cryptographic Protocols --
5. Elementary Number Theoretic Techniques --
6. Some Number Theoretic Algorithms --
7. Public Key Cryptography --
8. Elliptic Curve Cryptography --
9. Basic Concepts from Group Theory --
10. Non-Commutative Group Based Cryptography --
11. Platform Groups and Braid Group Cryptography --
12. Further Applications Using Group Theory --
13. Commutative Gr bner Basis Methods --
14. Non-Commutative Gr bner Basis Methods --
15. Lattice-Based Cryptography --
Bibliography --
Index