A Course in Mathematical Cryptography / / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.

Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by th...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015
VerfasserIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2015]
©2015
Year of Publication:2015
Language:English
Series:De Gruyter Textbook
Online Access:
Physical Description:1 online resource (376 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 05108nam a22009495i 4500
001 9783110372779
003 DE-B1597
005 20210830012106.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 210830t20152015gw fo d z eng d
010 |a 2015302822 
019 |a (OCoLC)927947377 
020 |a 9783110372779 
024 7 |a 10.1515/9783110372779  |2 doi 
035 |a (DE-B1597)428756 
035 |a (OCoLC)911847200 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a gw  |c DE 
050 0 0 |a QA268  |b .B38 2015 
050 4 |a QA268  |b .C696 2016 
072 7 |a COM014000  |2 bisacsh 
082 0 4 |a 003/.54  |2 23 
100 1 |a Baumslag, Gilbert,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 2 |a A Course in Mathematical Cryptography /  |c Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger. 
264 1 |a Berlin ;  |a Boston :   |b De Gruyter,   |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (376 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 0 |a De Gruyter Textbook 
505 0 0 |t Frontmatter --   |t Preface --   |t Contents --   |t 1. Basic Ideas of Cryptography --   |t 2. Symmetric Key Cryptosystems --   |t 3. Cryptanalysis and Complexity --   |t 4. Cryptographic Protocols --   |t 5. Elementary Number Theoretic Techniques --   |t 6. Some Number Theoretic Algorithms --   |t 7. Public Key Cryptography --   |t 8. Elliptic Curve Cryptography --   |t 9. Basic Concepts from Group Theory --   |t 10. Non-Commutative Group Based Cryptography --   |t 11. Platform Groups and Braid Group Cryptography --   |t 12. Further Applications Using Group Theory --   |t 13. Commutative Gröbner Basis Methods --   |t 14. Non-Commutative Gröbner Basis Methods --   |t 15. Lattice-Based Cryptography --   |t Bibliography --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) 
650 0 |a Coding theory  |v Textbooks. 
650 0 |a Coding theory  |x Textbooks. 
650 0 |a Coding theory. 
650 0 |a Cryptography  |x Mathematics  |v Textbooks. 
650 0 |a Cryptography  |x Mathematics. 
650 0 |a Cryptography  |x United States  |x United States. 
650 0 |a Cryptography  |z United States. 
650 0 |a Data encryption (Computer science) 
650 0 |a Data encryption (Computer science). 
650 0 |a Public key cryptography. 
650 4 |a Kyptographie. 
650 7 |a COMPUTERS / Computer Science.  |2 bisacsh 
700 1 |a Fine, Benjamin,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Kreuzer, Martin,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Rosenberger, Gerhard,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t DG Plus eBook-Package 2015  |z 9783110700985 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2015  |z 9783110439687  |o ZDB-23-DGG 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Engineering, Computer Sciences 2015  |z 9783110438772  |o ZDB-23-DEI 
776 0 |c EPUB  |z 9783110386165 
776 0 |c print  |z 9783110372762 
856 4 0 |u https://doi.org/10.1515/9783110372779 
856 4 0 |u https://www.degruyter.com/isbn/9783110372779 
856 4 2 |3 Cover  |u https://www.degruyter.com/cover/covers/9783110372779.jpg 
912 |a 978-3-11-070098-5 DG Plus eBook-Package 2015  |b 2015 
912 |a EBA_BACKALL 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_CL_MTPY 
912 |a EBA_DGALL 
912 |a EBA_EBACKALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_ECL_MTPY 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK 
912 |a ZDB-23-DEI  |b 2015 
912 |a ZDB-23-DGG  |b 2015