Cryptography

This text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication. Beginning with classical ciphers and their cryptanalysis, this book proceeds to focus on modern public key cryptosystems such as Diffie-Hellman, ElGamal, RSA, and elliptic curve cr...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Rubinstein-Salzedo, Simon (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Springer Undergraduate Mathematics Series,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02722nam a2200457 4500
001 978-3-319-94818-8
003 DE-He213
005 20190618011827.0
007 cr nn 008mamaa
008 180927s2018 gw | s |||| 0|eng d
020 |a 9783319948188  |9 978-3-319-94818-8 
024 7 |a 10.1007/978-3-319-94818-8  |2 doi 
040 |d GrThAP 
050 4 |a QA241-247.5 
072 7 |a PBH  |2 bicssc 
072 7 |a MAT022000  |2 bisacsh 
072 7 |a PBH  |2 thema 
082 0 4 |a 512.7  |2 23 
100 1 |a Rubinstein-Salzedo, Simon.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cryptography  |h [electronic resource] /  |c by Simon Rubinstein-Salzedo. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XII, 259 p. 17 illus., 7 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Springer Undergraduate Mathematics Series,  |x 1615-2085 
520 |a This text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication. Beginning with classical ciphers and their cryptanalysis, this book proceeds to focus on modern public key cryptosystems such as Diffie-Hellman, ElGamal, RSA, and elliptic curve cryptography with an analysis of vulnerabilities of these systems and underlying mathematical issues such as factorization algorithms. Specialized topics such as zero knowledge proofs, cryptographic voting, coding theory, and new research are covered in the final section of this book. Aimed at undergraduate students, this book contains a large selection of problems, ranging from straightforward to difficult, and can be used as a textbook for classes as well as self-study. Requiring only a solid grounding in basic mathematics, this book will also appeal to advanced high school students and amateur mathematicians interested in this fascinating and topical subject. . 
650 0 |a Number theory. 
650 0 |a Combinatorics. 
650 1 4 |a Number Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/M25001 
650 2 4 |a Combinatorics.  |0 http://scigraph.springernature.com/things/product-market-codes/M29010 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319948171 
776 0 8 |i Printed edition:  |z 9783319948195 
830 0 |a Springer Undergraduate Mathematics Series,  |x 1615-2085 
856 4 0 |u https://doi.org/10.1007/978-3-319-94818-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SMA 
950 |a Mathematics and Statistics (Springer-11649)