Algebraic Aspects of Cryptography: Algorithms and Computation in Mathematics, cartea 3
Apendix de A.J. Menezes Autor Neal Koblitz Apendix de Y.-H. Wu, R.J. Zuccheratoen Limba Engleză Paperback – 21 oct 2010
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1110.21 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 21 oct 2010 | 1110.21 lei 6-8 săpt. | |
Hardback (1) | 1114.66 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 5 ian 1998 | 1114.66 lei 6-8 săpt. |
Din seria Algorithms and Computation in Mathematics
- 15% Preț: 645.76 lei
- 18% Preț: 701.32 lei
- 15% Preț: 579.67 lei
- Preț: 470.53 lei
- 15% Preț: 618.69 lei
- Preț: 389.84 lei
- Preț: 386.90 lei
- 18% Preț: 710.73 lei
- Preț: 383.02 lei
- 18% Preț: 1078.62 lei
- 15% Preț: 635.96 lei
- 20% Preț: 631.54 lei
- 15% Preț: 461.14 lei
- Preț: 382.45 lei
- 15% Preț: 568.81 lei
- Preț: 378.57 lei
- 20% Preț: 318.00 lei
- 18% Preț: 925.89 lei
- 23% Preț: 638.32 lei
- 15% Preț: 574.02 lei
- Preț: 383.19 lei
- 18% Preț: 757.19 lei
- 15% Preț: 674.56 lei
- 18% Preț: 730.67 lei
- 18% Preț: 928.94 lei
- 20% Preț: 328.63 lei
- Preț: 499.24 lei
Preț: 1110.21 lei
Preț vechi: 1387.76 lei
-20% Nou
Puncte Express: 1665
Preț estimativ în valută:
212.48€ • 224.16$ • 177.07£
212.48€ • 224.16$ • 177.07£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642083327
ISBN-10: 3642083323
Pagini: 220
Ilustrații: IX, 206 p.
Dimensiuni: 155 x 235 x 12 mm
Greutate: 0.31 kg
Ediția:1998
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Algorithms and Computation in Mathematics
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642083323
Pagini: 220
Ilustrații: IX, 206 p.
Dimensiuni: 155 x 235 x 12 mm
Greutate: 0.31 kg
Ediția:1998
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Algorithms and Computation in Mathematics
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
1. Cryptography.- §1. Early History.- §2. The Idea of Public Key Cryptography.- §3. The RSA Cryptosystem.- §4. Diffie-Hellman and the Digital Signature Algorithm.- §5. Secret Sharing, Coin Flipping, and Time Spent on Homework.- §6. Passwords, Signatures, and Ciphers.- §7. Practical Cryptosystems and Useful Impractical Ones.- 2. Complexity of Computations.- §1. The Big-O Notation.- §2. Length of Numbers.- §3. Time Estimates.- §4. P, NP, and NP-Completeness.- §5. Promise Problems.- §6. Randomized Algorithms and Complexity Classes.- §7. Some Other Complexity Classes.- 3. Algebra.- §1. Fields.- §2. Finite Fields.- §3. The Euclidean Algorithm for Polynomials.- §4. Polynomial Rings.- §5. Gröbner Bases.- 4. Hidden Monomial Cryptosystems.- § 1. The Imai-Matsumoto System.- §2. Patarin’s Little Dragon.- §3. Systems That Might Be More Secure.- 5. Combinatorial-Algebraic Cryptosystems.- §1. History.- §2. Irrelevance of Brassard’s Theorem.- §3. Concrete Combinatorial-Algebraic Systems.- §4. The Basic Computational Algebra Problem.- §5. Cryptographic Version of Ideal Membership.- §6. Linear Algebra Attacks.- §7. Designing a Secure System.- 6. Elliptic and Hyperelliptic Cryptosystems.- § 1. Elliptic Curves.- §2. Elliptic Curve Cryptosystems.- §3. Elliptic Curve Analogues of Classical Number Theory Problems.- §4. Cultural Background: Conjectures on Elliptic Curves and Surprising Relations with Other Problems.- §5. Hyperelliptic Curves.- §6. Hyperelliptic Cryptosystems.- §1. Basic Definitions and Properties.- §2. Polynomial and Rational Functions.- §3. Zeros and Poles.- §4. Divisors.- §5. Representing Semi-Reduced Divisors.- §6. Reduced Divisors.- §7. Adding Reduced Divisors.- Exercises.- Answers to Exercises.
Recenzii
"... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher."
M.V.D.Burmester, Mathematical Reviews 2002
"... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Paturi's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with ther researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory."
Péter Hajnal, Acta Scientiarum Mathematicarum, 64.1998, p. 750
"... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication."
E.Leiss, Computing Reviews 1998, p. 506
"... Der Autor, der ... vielen Lesern dieses Rundbriefs gut bekannt sein wird, hat hier ein kleines Werk vorgelegt, das man wohl am Besten als "Lesebuch zu algebraischen Aspekten der Kryptographie mit öffentlichem Schlüssel" charakterisieren kann. ...
Mit zunehmender Schwierigkeit des Material werden die Ausführungen dabei skizzenhafter und beschränken sich immer stärker auf den Hinweis auf entsprechende Quellen, was den Charakter eines guten "Lesebuchs", wie ich es oben bezeichnet habe, ausmachen sollte. Das Buch eignet sich damit selbst für "advanced undergraduates", wie es im Klappentext heißt, als Einstieg und erster Überblick über ein Gebiet, in dem sich in den letzten Jahren auf überraschendeWeise praktische Anwendungsmöglichkeiten für tief innermathematische Themen ergeben haben."
Hans-Gert Gräbe, Computeralgebra Rundbrief 1999, Issue 25
"... Es gelingt Koblitz, anschaulich und mit elementaren Mitteln auch Dinge zu erläutern, die in vergleichbaren Texten kaum zu finden sind: z.B. den Hilbertschen Basis- und Nullstellensatz, sowie Gröbnerbasen. ..."
Franz Lemmermeyer, Mathematische Semesterberichte 1999, 46/1
M.V.D.Burmester, Mathematical Reviews 2002
"... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Paturi's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with ther researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory."
Péter Hajnal, Acta Scientiarum Mathematicarum, 64.1998, p. 750
"... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication."
E.Leiss, Computing Reviews 1998, p. 506
"... Der Autor, der ... vielen Lesern dieses Rundbriefs gut bekannt sein wird, hat hier ein kleines Werk vorgelegt, das man wohl am Besten als "Lesebuch zu algebraischen Aspekten der Kryptographie mit öffentlichem Schlüssel" charakterisieren kann. ...
Mit zunehmender Schwierigkeit des Material werden die Ausführungen dabei skizzenhafter und beschränken sich immer stärker auf den Hinweis auf entsprechende Quellen, was den Charakter eines guten "Lesebuchs", wie ich es oben bezeichnet habe, ausmachen sollte. Das Buch eignet sich damit selbst für "advanced undergraduates", wie es im Klappentext heißt, als Einstieg und erster Überblick über ein Gebiet, in dem sich in den letzten Jahren auf überraschendeWeise praktische Anwendungsmöglichkeiten für tief innermathematische Themen ergeben haben."
Hans-Gert Gräbe, Computeralgebra Rundbrief 1999, Issue 25
"... Es gelingt Koblitz, anschaulich und mit elementaren Mitteln auch Dinge zu erläutern, die in vergleichbaren Texten kaum zu finden sind: z.B. den Hilbertschen Basis- und Nullstellensatz, sowie Gröbnerbasen. ..."
Franz Lemmermeyer, Mathematische Semesterberichte 1999, 46/1
Textul de pe ultima copertă
This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.
From the reviews:
"... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher."
M.V.D.Burmester, Mathematical Reviews 2002
"... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory."
P. Hajnal, Acta Scientiarum Mathematicarum 64.1998
"... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication."
E.Leiss, Computing Reviews 1998
From the reviews:
"... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher."
M.V.D.Burmester, Mathematical Reviews 2002
"... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory."
P. Hajnal, Acta Scientiarum Mathematicarum 64.1998
"... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication."
E.Leiss, Computing Reviews 1998
Caracteristici
Cryptography is one of the hot topics right now used for manifold applications, such as telecommunication, secrecy for internet etc. Leads readers into advanced methods in number theory which are used for cryptography