A course in mathematical cryptography /
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by th...
Saved in:
Corporate Authors: | |
---|---|
Group Author: | ; ; |
Published: |
De Gruyter,
|
Publisher Address: | Berlin ;Boston : |
Publication Dates: |
[2015] ©2015 |
Literature type: | eBook |
Language: | English |
Series: |
De gruyter textbook
|
Subjects: | |
Online Access: |
http://dx.doi.org/10.1515/9783110372779 http://www.degruyter.com/doc/cover/9783110372779.jpg |
Summary: |
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gr bner Basis Methods in Cryptography Lattice-Based Cryptography |
Carrier Form: | 1 online resource (389 pages). |
ISBN: | 9783110372779 |
Index Number: | QA268 |
CLC: | O157.4 |
Contents: |
Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gr bner Basis Methods -- 14. Non-Commutative Gr bner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index |