A Course in Mathematical Cryptography / / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by th...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2015] ©2015 |
Year of Publication: | 2015 |
Language: | English |
Series: | De Gruyter Textbook
|
Online Access: | |
Physical Description: | 1 online resource (376 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9783110372779 |
---|---|
lccn |
2015302822 |
ctrlnum |
(DE-B1597)428756 (OCoLC)911847200 |
collection |
bib_alma |
record_format |
marc |
spelling |
Baumslag, Gilbert, author. aut http://id.loc.gov/vocabulary/relators/aut A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger. Berlin ; Boston : De Gruyter, [2015] ©2015 1 online resource (376 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda De Gruyter Textbook Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) Coding theory Textbooks. Coding theory. Cryptography Mathematics Textbooks. Cryptography Mathematics. Cryptography United States United States. Cryptography United States. Data encryption (Computer science) Data encryption (Computer science). Public key cryptography. Kyptographie. COMPUTERS / Computer Science. bisacsh Fine, Benjamin, author. aut http://id.loc.gov/vocabulary/relators/aut Kreuzer, Martin, author. aut http://id.loc.gov/vocabulary/relators/aut Rosenberger, Gerhard, author. aut http://id.loc.gov/vocabulary/relators/aut Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015 9783110700985 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2015 9783110439687 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2015 9783110438772 ZDB-23-DEI EPUB 9783110386165 print 9783110372762 https://doi.org/10.1515/9783110372779 https://www.degruyter.com/isbn/9783110372779 Cover https://www.degruyter.com/cover/covers/9783110372779.jpg |
language |
English |
format |
eBook |
author |
Baumslag, Gilbert, Baumslag, Gilbert, Fine, Benjamin, Kreuzer, Martin, Rosenberger, Gerhard, |
spellingShingle |
Baumslag, Gilbert, Baumslag, Gilbert, Fine, Benjamin, Kreuzer, Martin, Rosenberger, Gerhard, A Course in Mathematical Cryptography / De Gruyter Textbook Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index |
author_facet |
Baumslag, Gilbert, Baumslag, Gilbert, Fine, Benjamin, Kreuzer, Martin, Rosenberger, Gerhard, Fine, Benjamin, Fine, Benjamin, Kreuzer, Martin, Kreuzer, Martin, Rosenberger, Gerhard, Rosenberger, Gerhard, |
author_variant |
g b gb g b gb b f bf m k mk g r gr |
author_role |
VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn |
author2 |
Fine, Benjamin, Fine, Benjamin, Kreuzer, Martin, Kreuzer, Martin, Rosenberger, Gerhard, Rosenberger, Gerhard, |
author2_variant |
b f bf m k mk g r gr |
author2_role |
VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn |
author_sort |
Baumslag, Gilbert, |
title |
A Course in Mathematical Cryptography / |
title_full |
A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger. |
title_fullStr |
A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger. |
title_full_unstemmed |
A Course in Mathematical Cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger. |
title_auth |
A Course in Mathematical Cryptography / |
title_alt |
Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index |
title_new |
A Course in Mathematical Cryptography / |
title_sort |
a course in mathematical cryptography / |
series |
De Gruyter Textbook |
series2 |
De Gruyter Textbook |
publisher |
De Gruyter, |
publishDate |
2015 |
physical |
1 online resource (376 p.) |
contents |
Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index |
isbn |
9783110372779 9783110700985 9783110439687 9783110438772 9783110386165 9783110372762 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA268 |
callnumber-sort |
QA 3268 B38 42015 |
genre_facet |
Textbooks. |
geographic_facet |
United States. |
url |
https://doi.org/10.1515/9783110372779 https://www.degruyter.com/isbn/9783110372779 https://www.degruyter.com/cover/covers/9783110372779.jpg |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
003 - Systems |
dewey-full |
003/.54 |
dewey-sort |
13 254 |
dewey-raw |
003/.54 |
dewey-search |
003/.54 |
doi_str_mv |
10.1515/9783110372779 |
oclc_num |
911847200 |
work_keys_str_mv |
AT baumslaggilbert acourseinmathematicalcryptography AT finebenjamin acourseinmathematicalcryptography AT kreuzermartin acourseinmathematicalcryptography AT rosenbergergerhard acourseinmathematicalcryptography AT baumslaggilbert courseinmathematicalcryptography AT finebenjamin courseinmathematicalcryptography AT kreuzermartin courseinmathematicalcryptography AT rosenbergergerhard courseinmathematicalcryptography |
status_str |
n |
ids_txt_mv |
(DE-B1597)428756 (OCoLC)911847200 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2015 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2015 |
is_hierarchy_title |
A Course in Mathematical Cryptography / |
container_title |
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2015 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1770177584815931392 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05108nam a22009495i 4500</leader><controlfield tag="001">9783110372779</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20152015gw fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2015302822</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)927947377</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110372779</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110372779</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)428756</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)911847200</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">QA268</subfield><subfield code="b">.B38 2015</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA268</subfield><subfield code="b">.C696 2016</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">003/.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Baumslag, Gilbert, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A Course in Mathematical Cryptography /</subfield><subfield code="c">Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (376 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Textbook</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">1. Basic Ideas of Cryptography -- </subfield><subfield code="t">2. Symmetric Key Cryptosystems -- </subfield><subfield code="t">3. Cryptanalysis and Complexity -- </subfield><subfield code="t">4. Cryptographic Protocols -- </subfield><subfield code="t">5. Elementary Number Theoretic Techniques -- </subfield><subfield code="t">6. Some Number Theoretic Algorithms -- </subfield><subfield code="t">7. Public Key Cryptography -- </subfield><subfield code="t">8. Elliptic Curve Cryptography -- </subfield><subfield code="t">9. Basic Concepts from Group Theory -- </subfield><subfield code="t">10. Non-Commutative Group Based Cryptography -- </subfield><subfield code="t">11. Platform Groups and Braid Group Cryptography -- </subfield><subfield code="t">12. Further Applications Using Group Theory -- </subfield><subfield code="t">13. Commutative Gröbner Basis Methods -- </subfield><subfield code="t">14. Non-Commutative Gröbner Basis Methods -- </subfield><subfield code="t">15. Lattice-Based Cryptography -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield><subfield code="v">Textbooks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield><subfield code="x">Textbooks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">Mathematics</subfield><subfield code="v">Textbooks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">Mathematics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">United States</subfield><subfield code="x">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kyptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fine, Benjamin, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kreuzer, Martin, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rosenberger, Gerhard, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus eBook-Package 2015</subfield><subfield code="z">9783110700985</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2015</subfield><subfield code="z">9783110439687</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2015</subfield><subfield code="z">9783110438772</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110386165</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110372762</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110372779</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110372779</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9783110372779.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070098-5 DG Plus eBook-Package 2015</subfield><subfield code="b">2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2015</subfield></datafield></record></collection> |