An Introduction to Mathematical Cryptography: Undergraduate Texts in Mathematics
Autor Jeffrey Hoffstein, Jill Pipher, J.H. Silvermanen Limba Engleză Paperback – dec 2010
Din seria Undergraduate Texts in Mathematics
- 17% Preț: 362.12 lei
- 17% Preț: 365.42 lei
- Preț: 340.06 lei
- Preț: 341.79 lei
- 18% Preț: 308.99 lei
- 17% Preț: 367.24 lei
- Preț: 345.60 lei
- Preț: 407.95 lei
- Preț: 322.47 lei
- Preț: 359.48 lei
- 19% Preț: 400.50 lei
- Preț: 402.33 lei
- Preț: 373.46 lei
- Preț: 424.11 lei
- 13% Preț: 392.42 lei
- Preț: 421.49 lei
- 18% Preț: 326.99 lei
- Preț: 381.68 lei
- Preț: 332.01 lei
- 17% Preț: 395.92 lei
- Preț: 290.79 lei
- Preț: 298.00 lei
- Preț: 400.42 lei
- 14% Preț: 367.62 lei
- Preț: 407.61 lei
- Preț: 328.47 lei
- 17% Preț: 373.59 lei
- 13% Preț: 360.86 lei
- Preț: 400.42 lei
- Preț: 358.10 lei
- 17% Preț: 368.60 lei
- 17% Preț: 362.65 lei
- Preț: 383.85 lei
- Preț: 364.40 lei
- 15% Preț: 417.72 lei
- Preț: 332.31 lei
- 19% Preț: 492.82 lei
- Preț: 384.95 lei
- Preț: 378.99 lei
- 15% Preț: 506.14 lei
- Preț: 390.56 lei
- 15% Preț: 516.54 lei
- 15% Preț: 435.03 lei
- 15% Preț: 518.28 lei
- Preț: 378.99 lei
- 15% Preț: 558.95 lei
Preț: 390.74 lei
Nou
Puncte Express: 586
Preț estimativ în valută:
74.79€ • 77.95$ • 62.26£
74.79€ • 77.95$ • 62.26£
Carte tipărită la comandă
Livrare economică 06-20 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781441926746
ISBN-10: 1441926747
Pagini: 524
Ilustrații: XVI, 524 p. 29 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.75 kg
Ediția:Softcover reprint of hardcover 1st ed. 2008
Editura: Springer
Colecția Springer
Seria Undergraduate Texts in Mathematics
Locul publicării:New York, NY, United States
ISBN-10: 1441926747
Pagini: 524
Ilustrații: XVI, 524 p. 29 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.75 kg
Ediția:Softcover reprint of hardcover 1st ed. 2008
Editura: Springer
Colecția Springer
Seria Undergraduate Texts in Mathematics
Locul publicării:New York, NY, United States
Public țintă
GraduateCuprins
An Introduction to Cryptography.- Discrete Logarithms and Diffie Hellman.- Integer Factorization and RSA.- Combinatorics, Probability and Information Theory.- Elliptic Curves and Cryptography.- Lattices and Cryptography.- Digital Signatures.- Additional Topics in Cryptography.
Recenzii
From the reviews:
"The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in higher mathematics are needed. In fact, everything is explained and carefully covered … . there is abundance of examples and proposed exercises at the end of each chapter. … This book is ideal as a textbook for a course aimed at undergraduate mathematics or computer science students." (Fabio Mainardi, The Mathematical Association of America, October, 2008)
"This book focuses on public key cryptography … . Hoffstein, Pipher, and Silverman … provide a thorough treatment of the topics while keeping the material accessible. … The book uses examples throughout the text to illustrate the theorems, and provides a large number of exercises … . The volume includes a nice bibliography. … Summing Up: Highly recommended. Upper-division undergraduate through professional collections." (C. Bauer, Choice, Vol. 46 (7), March, 2009)
"For most undergraduate students in mathematics or computer science (CS), mathematical cryptography is a challenging subject. … it is written in a way that makes you want to keep reading. … The authors officially targeted the book for advanced undergraduate or beginning graduate students. I believe that this audience is appropriate. … it could even be used with students who are just learning how to execute rigorous mathematical proofs. … I strongly believe that it finds the right tone for today’s students … ." (Burkhard Englert, ACM Computing Reviews, March, 2009)
"The exercises and text would make an excellent course for undergraduate independent study. … This is an excellent book. Hoffstein, Pipher and Silverman have written as good a book as is possible to explain public key cryptography. … This book would probably be best suited for a graduate course that focused on public key cryptography, for undergraduate independent study, or for the mathematician who wants to see how mathematics is used in public key cryptography." (Jintai Ding and Chris Christensen, Mathematical Reviews, Issue 2009 m)
"The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in higher mathematics are needed. In fact, everything is explained and carefully covered … . there is abundance of examples and proposed exercises at the end of each chapter. … This book is ideal as a textbook for a course aimed at undergraduate mathematics or computer science students." (Fabio Mainardi, The Mathematical Association of America, October, 2008)
"This book focuses on public key cryptography … . Hoffstein, Pipher, and Silverman … provide a thorough treatment of the topics while keeping the material accessible. … The book uses examples throughout the text to illustrate the theorems, and provides a large number of exercises … . The volume includes a nice bibliography. … Summing Up: Highly recommended. Upper-division undergraduate through professional collections." (C. Bauer, Choice, Vol. 46 (7), March, 2009)
"For most undergraduate students in mathematics or computer science (CS), mathematical cryptography is a challenging subject. … it is written in a way that makes you want to keep reading. … The authors officially targeted the book for advanced undergraduate or beginning graduate students. I believe that this audience is appropriate. … it could even be used with students who are just learning how to execute rigorous mathematical proofs. … I strongly believe that it finds the right tone for today’s students … ." (Burkhard Englert, ACM Computing Reviews, March, 2009)
"The exercises and text would make an excellent course for undergraduate independent study. … This is an excellent book. Hoffstein, Pipher and Silverman have written as good a book as is possible to explain public key cryptography. … This book would probably be best suited for a graduate course that focused on public key cryptography, for undergraduate independent study, or for the mathematician who wants to see how mathematics is used in public key cryptography." (Jintai Ding and Chris Christensen, Mathematical Reviews, Issue 2009 m)
Notă biografică
Dr. Jeffrey Hoffstein has been a professor at Brown University since 1989 and has been a visiting professor and tenured professor at several other universities since 1978. His research areas are number theory, automorphic forms, and cryptography. He has authored more than 50 publications.
Dr. Jill Pipher has been a professor at Brown Univesity since 1989. She has been an invited lecturer and has received numerous awards and honors. Her research areas are harmonic analysis, elliptic PDE, and cryptography. She has authored over 40 publications.
Dr. Joseph Silverman has been a professor at Brown University 1988. He served as the Chair of the Brown Mathematics department from 2001–2004. He has received numerous fellowships, grants and awards and is a frequently invited lecturer. His research areas are number theory, arithmetic geometry, elliptic curves, dynamical systems and cryptography. Hehas authored more than120 publications and has had more than 20 doctoral students.
Dr. Jill Pipher has been a professor at Brown Univesity since 1989. She has been an invited lecturer and has received numerous awards and honors. Her research areas are harmonic analysis, elliptic PDE, and cryptography. She has authored over 40 publications.
Dr. Joseph Silverman has been a professor at Brown University 1988. He served as the Chair of the Brown Mathematics department from 2001–2004. He has received numerous fellowships, grants and awards and is a frequently invited lecturer. His research areas are number theory, arithmetic geometry, elliptic curves, dynamical systems and cryptography. Hehas authored more than120 publications and has had more than 20 doctoral students.
Textul de pe ultima copertă
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required.
The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include:
* classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures;
* fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms;
* an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem.
This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.
The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include:
* classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures;
* fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms;
* an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem.
This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.
Caracteristici
Detailed introduction to elliptic curves and how they're used in cryptography, including the “hot” recent topic of elliptic curve pairing-based cryptography Detailed introduction to lattices and lattice based cryptography Provides an entry for graduate students into an active field of research Includes exercises and examples at the end of each section A standard reference for researchers in the field May be implemented in a classroom setting or independent study Request lecturer material: sn.pub/lecturer-material