Algebra for applications [Documento eletrónico] : cryptography, secret sharing, error-correcting, fingerprinting, compression / Arkadii Slinko
Language: eng.Country: Switzerland, Swiss Confederation, Cham.Edition Statement: 2nd ed. Publication: Cham : Springer International Publishing, 2020Description: XIV, 368 p. : il.ISBN: 978-3-030-44074-9.Series: Springer Undergraduate Mathematics SeriesSubject - Topical Name: Álgebra | Matemática aplicada Online Resources:Click here to access onlineItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
E-Books | Biblioteca NOVA FCT Online | Não Ficção | QA155.SPR FCT 103652 (Browse shelf(Opens below)) | 1 | Available | 96365 |
Browsing Biblioteca NOVA FCT shelves, Shelving location: Online, Collection: Não Ficção Close shelf browser (Hides shelf browser)
QA155.FCT FCT 96816 Topics in algebra and analysis, preparing for the mathematical olympiad | QA155.SPR FCT 102552 A primer of subquasivariety lattices | QA155.SPR FCT 103632 Leavitt path algebras and classical k-theory | QA155.SPR FCT 103652 Algebra for applications, cryptography, secret sharing, error-correcting, fingerprinting, compression | QA155.SPR FCT 103657 P-adic numbers, an introduction | QA155.SPR FCT 103659 Operator algebras and dynamics, groupoids, crossed products, and rokhlin dimension | QA155.SPR FCT 80837 A concrete introduction to higher algebra |
Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationally hard problems and giving insights into how computational complexity can be used to protect the integrity of data. The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.
There are no comments on this title.