spelling |
oapen-20.500.12657-544582022-05-14T02:53:40Z Modern Cryptography Volume 1 Zheng, Zhiyong Modern Cryptography Computational Complexity Hamming Distance Shannon Theorem Source Coding Theorem Optimal Code Theory Statistical Characteristics of Cryptosystem Elliptic Curve Public Key Cryptosystem Integer Lattice and Q-ary Lattice NTRU Cryptosystem and Ajtai/Dwork Cryptosystem bic Book Industry Communication::K Economics, finance, business & management::KF Finance & accounting::KFF Finance bic Book Industry Communication::P Mathematics & science::PB Mathematics::PBW Applied mathematics bic Book Industry Communication::U Computing & information technology::UY Computer science::UYA Mathematical theory of computation This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical characteristics and computational complexity theory of public key cryptography, focusing on the three main algorithms of public key cryptography, RSA, discrete logarithm and elliptic curve cryptosystem. It aims to indicate what it is and why it is. It systematically simplifies and combs the theory and technology of lattice cryptography, which is the greatest feature of this book. It requires a good knowledge in algebra, number theory and probability statistics for readers to read this book. The senior students majoring in mathematics, compulsory for cryptography and science and engineering postgraduates will find this book helpful. It can also be used as the main reference book for researchers in cryptography and cryptographic engineering areas. 2022-05-13T12:19:53Z 2022-05-13T12:19:53Z 2022 book ONIX_20220513_9789811909207_50 9789811909207 https://library.oapen.org/handle/20.500.12657/54458 eng Financial Mathematics and Fintech application/pdf n/a 978-981-19-0920-7.pdf https://link.springer.com/978-981-19-0920-7 Springer Nature Springer Nature Singapore 10.1007/978-981-19-0920-7 10.1007/978-981-19-0920-7 6c6992af-b843-4f46-859c-f6e9998e40d5 9789811909207 Springer Nature Singapore 359 Singapore open access
|
description |
This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical characteristics and computational complexity theory of public key cryptography, focusing on the three main algorithms of public key cryptography, RSA, discrete logarithm and elliptic curve cryptosystem. It aims to indicate what it is and why it is. It systematically simplifies and combs the theory and technology of lattice cryptography, which is the greatest feature of this book. It requires a good knowledge in algebra, number theory and probability statistics for readers to read this book. The senior students majoring in mathematics, compulsory for cryptography and science and engineering postgraduates will find this book helpful. It can also be used as the main reference book for researchers in cryptography and cryptographic engineering areas.
|