000 | 02890nam a22003255i 4500 | ||
---|---|---|---|
001 | 65504 | ||
005 | 20210505153403.0 | ||
010 |
_a978-1-4939-1711-2 _dcompra |
||
090 | _a65504 | ||
100 | _a20150401d2014 k||y0pory50 ba | ||
101 | _aeng | ||
102 | _aUS | ||
200 |
_aAn introduction to mathematical cryptography _bDocumento electrónico _fJeffrey Hoffstein, Jill Pipher, Joseph H. Silverman |
||
210 |
_aNew York, NY _cSpringer _d2014 |
||
215 |
_aXVII, 538 p. _cil. |
||
225 | _aUndergraduate Texts in Mathematics | ||
300 | _aColocação: Online | ||
303 | _aThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie–Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included. | ||
606 | _aTeoria de codificação | ||
606 | _aCriptografia | ||
680 | _aQA268 | ||
700 |
_aHoffstein _bJeffrey |
||
701 |
_958113 _aPipher _bJill _4070 |
||
701 |
_916408 _aSilverman _bJoseph H. _4070 |
||
801 |
_aPT _gRPC |
||
856 | _uhttp://dx.doi.org/10.1007/978-1-4939-1711-2 | ||
942 |
_2lcc _cF _n0 |