A Course in Mathematical Cryptography / / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by th...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2015] ©2015 |
Year of Publication: | 2015 |
Language: | English |
Series: | De Gruyter Textbook
|
Online Access: | |
Physical Description: | 1 online resource (376 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 05108nam a22009495i 4500 | ||
---|---|---|---|
001 | 9783110372779 | ||
003 | DE-B1597 | ||
005 | 20210830012106.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 210830t20152015gw fo d z eng d | ||
010 | |a 2015302822 | ||
019 | |a (OCoLC)927947377 | ||
020 | |a 9783110372779 | ||
024 | 7 | |a 10.1515/9783110372779 |2 doi | |
035 | |a (DE-B1597)428756 | ||
035 | |a (OCoLC)911847200 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
050 | 0 | 0 | |a QA268 |b .B38 2015 |
050 | 4 | |a QA268 |b .C696 2016 | |
072 | 7 | |a COM014000 |2 bisacsh | |
082 | 0 | 4 | |a 003/.54 |2 23 |
100 | 1 | |a Baumslag, Gilbert, |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 2 | |a A Course in Mathematical Cryptography / |c Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger. |
264 | 1 | |a Berlin ; |a Boston : |b De Gruyter, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (376 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 0 | |a De Gruyter Textbook | |
505 | 0 | 0 | |t Frontmatter -- |t Preface -- |t Contents -- |t 1. Basic Ideas of Cryptography -- |t 2. Symmetric Key Cryptosystems -- |t 3. Cryptanalysis and Complexity -- |t 4. Cryptographic Protocols -- |t 5. Elementary Number Theoretic Techniques -- |t 6. Some Number Theoretic Algorithms -- |t 7. Public Key Cryptography -- |t 8. Elliptic Curve Cryptography -- |t 9. Basic Concepts from Group Theory -- |t 10. Non-Commutative Group Based Cryptography -- |t 11. Platform Groups and Braid Group Cryptography -- |t 12. Further Applications Using Group Theory -- |t 13. Commutative Gröbner Basis Methods -- |t 14. Non-Commutative Gröbner Basis Methods -- |t 15. Lattice-Based Cryptography -- |t Bibliography -- |t Index |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) | |
650 | 0 | |a Coding theory |v Textbooks. | |
650 | 0 | |a Coding theory |x Textbooks. | |
650 | 0 | |a Coding theory. | |
650 | 0 | |a Cryptography |x Mathematics |v Textbooks. | |
650 | 0 | |a Cryptography |x Mathematics. | |
650 | 0 | |a Cryptography |x United States |x United States. | |
650 | 0 | |a Cryptography |z United States. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Public key cryptography. | |
650 | 4 | |a Kyptographie. | |
650 | 7 | |a COMPUTERS / Computer Science. |2 bisacsh | |
700 | 1 | |a Fine, Benjamin, |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
700 | 1 | |a Kreuzer, Martin, |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
700 | 1 | |a Rosenberger, Gerhard, |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t DG Plus eBook-Package 2015 |z 9783110700985 |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t EBOOK PACKAGE COMPLETE 2015 |z 9783110439687 |o ZDB-23-DGG |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t EBOOK PACKAGE Engineering, Computer Sciences 2015 |z 9783110438772 |o ZDB-23-DEI |
776 | 0 | |c EPUB |z 9783110386165 | |
776 | 0 | |c print |z 9783110372762 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9783110372779 |
856 | 4 | 0 | |u https://www.degruyter.com/isbn/9783110372779 |
856 | 4 | 2 | |3 Cover |u https://www.degruyter.com/cover/covers/9783110372779.jpg |
912 | |a 978-3-11-070098-5 DG Plus eBook-Package 2015 |b 2015 | ||
912 | |a EBA_BACKALL | ||
912 | |a EBA_CL_CHCOMSGSEN | ||
912 | |a EBA_CL_MTPY | ||
912 | |a EBA_DGALL | ||
912 | |a EBA_EBACKALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_CHCOMSGSEN | ||
912 | |a EBA_ECL_MTPY | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESTMALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles | ||
912 | |a PDA12STME | ||
912 | |a PDA13ENGE | ||
912 | |a PDA18STMEE | ||
912 | |a PDA5EBK | ||
912 | |a ZDB-23-DEI |b 2015 | ||
912 | |a ZDB-23-DGG |b 2015 |