A Course in Mathematical Cryptography / / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.

Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by th...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015
VerfasserIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2015]
©2015
Year of Publication:2015
Language:English
Series:De Gruyter Textbook
Online Access:
Physical Description:1 online resource (376 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783110372779
lccn 2015302822
ctrlnum (DE-B1597)428756
(OCoLC)911847200
collection bib_alma
record_format marc
spelling Baumslag, Gilbert, author. aut http://id.loc.gov/vocabulary/relators/aut
A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
Berlin ; Boston : De Gruyter, [2015]
©2015
1 online resource (376 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
De Gruyter Textbook
Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
Coding theory Textbooks.
Coding theory.
Cryptography Mathematics Textbooks.
Cryptography Mathematics.
Cryptography United States United States.
Cryptography United States.
Data encryption (Computer science)
Data encryption (Computer science).
Public key cryptography.
Kyptographie.
COMPUTERS / Computer Science. bisacsh
Fine, Benjamin, author. aut http://id.loc.gov/vocabulary/relators/aut
Kreuzer, Martin, author. aut http://id.loc.gov/vocabulary/relators/aut
Rosenberger, Gerhard, author. aut http://id.loc.gov/vocabulary/relators/aut
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015 9783110700985
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2015 9783110439687 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2015 9783110438772 ZDB-23-DEI
EPUB 9783110386165
print 9783110372762
https://doi.org/10.1515/9783110372779
https://www.degruyter.com/isbn/9783110372779
Cover https://www.degruyter.com/cover/covers/9783110372779.jpg
language English
format eBook
author Baumslag, Gilbert,
Baumslag, Gilbert,
Fine, Benjamin,
Kreuzer, Martin,
Rosenberger, Gerhard,
spellingShingle Baumslag, Gilbert,
Baumslag, Gilbert,
Fine, Benjamin,
Kreuzer, Martin,
Rosenberger, Gerhard,
A Course in Mathematical Cryptography /
De Gruyter Textbook
Frontmatter --
Preface --
Contents --
1. Basic Ideas of Cryptography --
2. Symmetric Key Cryptosystems --
3. Cryptanalysis and Complexity --
4. Cryptographic Protocols --
5. Elementary Number Theoretic Techniques --
6. Some Number Theoretic Algorithms --
7. Public Key Cryptography --
8. Elliptic Curve Cryptography --
9. Basic Concepts from Group Theory --
10. Non-Commutative Group Based Cryptography --
11. Platform Groups and Braid Group Cryptography --
12. Further Applications Using Group Theory --
13. Commutative Gröbner Basis Methods --
14. Non-Commutative Gröbner Basis Methods --
15. Lattice-Based Cryptography --
Bibliography --
Index
author_facet Baumslag, Gilbert,
Baumslag, Gilbert,
Fine, Benjamin,
Kreuzer, Martin,
Rosenberger, Gerhard,
Fine, Benjamin,
Fine, Benjamin,
Kreuzer, Martin,
Kreuzer, Martin,
Rosenberger, Gerhard,
Rosenberger, Gerhard,
author_variant g b gb
g b gb
b f bf
m k mk
g r gr
author_role VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
author2 Fine, Benjamin,
Fine, Benjamin,
Kreuzer, Martin,
Kreuzer, Martin,
Rosenberger, Gerhard,
Rosenberger, Gerhard,
author2_variant b f bf
m k mk
g r gr
author2_role VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
author_sort Baumslag, Gilbert,
title A Course in Mathematical Cryptography /
title_full A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
title_fullStr A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
title_full_unstemmed A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
title_auth A Course in Mathematical Cryptography /
title_alt Frontmatter --
Preface --
Contents --
1. Basic Ideas of Cryptography --
2. Symmetric Key Cryptosystems --
3. Cryptanalysis and Complexity --
4. Cryptographic Protocols --
5. Elementary Number Theoretic Techniques --
6. Some Number Theoretic Algorithms --
7. Public Key Cryptography --
8. Elliptic Curve Cryptography --
9. Basic Concepts from Group Theory --
10. Non-Commutative Group Based Cryptography --
11. Platform Groups and Braid Group Cryptography --
12. Further Applications Using Group Theory --
13. Commutative Gröbner Basis Methods --
14. Non-Commutative Gröbner Basis Methods --
15. Lattice-Based Cryptography --
Bibliography --
Index
title_new A Course in Mathematical Cryptography /
title_sort a course in mathematical cryptography /
series De Gruyter Textbook
series2 De Gruyter Textbook
publisher De Gruyter,
publishDate 2015
physical 1 online resource (376 p.)
contents Frontmatter --
Preface --
Contents --
1. Basic Ideas of Cryptography --
2. Symmetric Key Cryptosystems --
3. Cryptanalysis and Complexity --
4. Cryptographic Protocols --
5. Elementary Number Theoretic Techniques --
6. Some Number Theoretic Algorithms --
7. Public Key Cryptography --
8. Elliptic Curve Cryptography --
9. Basic Concepts from Group Theory --
10. Non-Commutative Group Based Cryptography --
11. Platform Groups and Braid Group Cryptography --
12. Further Applications Using Group Theory --
13. Commutative Gröbner Basis Methods --
14. Non-Commutative Gröbner Basis Methods --
15. Lattice-Based Cryptography --
Bibliography --
Index
isbn 9783110372779
9783110700985
9783110439687
9783110438772
9783110386165
9783110372762
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA268
callnumber-sort QA 3268 B38 42015
genre_facet Textbooks.
geographic_facet United States.
url https://doi.org/10.1515/9783110372779
https://www.degruyter.com/isbn/9783110372779
https://www.degruyter.com/cover/covers/9783110372779.jpg
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 003 - Systems
dewey-full 003/.54
dewey-sort 13 254
dewey-raw 003/.54
dewey-search 003/.54
doi_str_mv 10.1515/9783110372779
oclc_num 911847200
work_keys_str_mv AT baumslaggilbert acourseinmathematicalcryptography
AT finebenjamin acourseinmathematicalcryptography
AT kreuzermartin acourseinmathematicalcryptography
AT rosenbergergerhard acourseinmathematicalcryptography
AT baumslaggilbert courseinmathematicalcryptography
AT finebenjamin courseinmathematicalcryptography
AT kreuzermartin courseinmathematicalcryptography
AT rosenbergergerhard courseinmathematicalcryptography
status_str n
ids_txt_mv (DE-B1597)428756
(OCoLC)911847200
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2015
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2015
is_hierarchy_title A Course in Mathematical Cryptography /
container_title Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1770177584815931392
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05108nam a22009495i 4500</leader><controlfield tag="001">9783110372779</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20152015gw fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2015302822</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)927947377</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110372779</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110372779</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)428756</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)911847200</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">QA268</subfield><subfield code="b">.B38 2015</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA268</subfield><subfield code="b">.C696 2016</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">003/.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Baumslag, Gilbert, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A Course in Mathematical Cryptography /</subfield><subfield code="c">Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (376 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Textbook</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">1. Basic Ideas of Cryptography -- </subfield><subfield code="t">2. Symmetric Key Cryptosystems -- </subfield><subfield code="t">3. Cryptanalysis and Complexity -- </subfield><subfield code="t">4. Cryptographic Protocols -- </subfield><subfield code="t">5. Elementary Number Theoretic Techniques -- </subfield><subfield code="t">6. Some Number Theoretic Algorithms -- </subfield><subfield code="t">7. Public Key Cryptography -- </subfield><subfield code="t">8. Elliptic Curve Cryptography -- </subfield><subfield code="t">9. Basic Concepts from Group Theory -- </subfield><subfield code="t">10. Non-Commutative Group Based Cryptography -- </subfield><subfield code="t">11. Platform Groups and Braid Group Cryptography -- </subfield><subfield code="t">12. Further Applications Using Group Theory -- </subfield><subfield code="t">13. Commutative Gröbner Basis Methods -- </subfield><subfield code="t">14. Non-Commutative Gröbner Basis Methods -- </subfield><subfield code="t">15. Lattice-Based Cryptography -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield><subfield code="v">Textbooks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield><subfield code="x">Textbooks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">Mathematics</subfield><subfield code="v">Textbooks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">Mathematics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">United States</subfield><subfield code="x">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kyptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fine, Benjamin, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kreuzer, Martin, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rosenberger, Gerhard, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus eBook-Package 2015</subfield><subfield code="z">9783110700985</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2015</subfield><subfield code="z">9783110439687</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2015</subfield><subfield code="z">9783110438772</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110386165</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110372762</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110372779</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110372779</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9783110372779.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070098-5 DG Plus eBook-Package 2015</subfield><subfield code="b">2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2015</subfield></datafield></record></collection>