Modern cryptography. Volume 1 : : a classical introduction to informational and mathematical principle / / Zhiyong Zheng.
This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shan...
Saved in:
Superior document: | Financial Mathematics and Fintech. |
---|---|
: | |
Year of Publication: | 2022 |
Edition: | 1st edition. |
Language: | English |
Series: | Financial Mathematics and Fintech.
|
Physical Description: | 1 online resource (XI, 359 p. 11 illus. :). |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545278904498 |
---|---|
ctrlnum |
(CKB)5850000000018210 EBL6954145 (AU-PeEL)EBL6954145 (MiAaPQ)EBC6954145 (oapen)https://directory.doabooks.org/handle/20.500.12854/81672 (EXLCZ)995850000000018210 |
collection |
bib_alma |
record_format |
marc |
spelling |
Zheng, Zhiyong Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / Zhiyong Zheng. 1st edition. Singapore : Springer, 2022. 1 online resource (XI, 359 p. 11 illus. :). text txt rdacontent computer c rdamedia online resource cr rdacarrier Financial Mathematics and Fintech. Description based upon print version of record. Chapter 1. Preparatory knowledge Chapter 2. The basis of code theory Chapter 3. Shannon theory Chapter 4. Cryptosystem and authentication system Chapter 5. Prime test Chapter 6. Elliptic curve Chapter 7. Lattice-based cryptography This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical characteristics and computational complexity theory of public key cryptography, focusing on the three main algorithms of public key cryptography, RSA, discrete logarithm and elliptic curve cryptosystem. It aims to indicate what it is and why it is. It systematically simplifies and combs the theory and technology of lattice cryptography, which is the greatest feature of this book. It requires a good knowledge in algebra, number theory and probability statistics for readers to read this book. The senior students majoring in mathematics, compulsory for cryptography and science and engineering postgraduates will find this book helpful. It can also be used as the main reference book for researchers in cryptography and cryptographic engineering areas. English Computer science Mathematics. Financial engineering. Social sciences Mathematics. Modern Cryptography Computational Complexity Hamming Distance Shannon Theorem Source Coding Theorem Optimal Code Theory Statistical Characteristics of Cryptosystem Elliptic Curve Public Key Cryptosystem Integer Lattice and Q-ary Lattice NTRU Cryptosystem and Ajtai/Dwork Cryptosystem 981-19-0919-9 |
language |
English |
format |
eBook |
author |
Zheng, Zhiyong |
spellingShingle |
Zheng, Zhiyong Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / Financial Mathematics and Fintech. Chapter 1. Preparatory knowledge Chapter 2. The basis of code theory Chapter 3. Shannon theory Chapter 4. Cryptosystem and authentication system Chapter 5. Prime test Chapter 6. Elliptic curve Chapter 7. Lattice-based cryptography |
author_facet |
Zheng, Zhiyong |
author_variant |
z z zz |
author_sort |
Zheng, Zhiyong |
title |
Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / |
title_sub |
a classical introduction to informational and mathematical principle / |
title_full |
Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / Zhiyong Zheng. |
title_fullStr |
Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / Zhiyong Zheng. |
title_full_unstemmed |
Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / Zhiyong Zheng. |
title_auth |
Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / |
title_new |
Modern cryptography. Volume 1 : |
title_sort |
modern cryptography. volume 1 : a classical introduction to informational and mathematical principle / |
series |
Financial Mathematics and Fintech. |
series2 |
Financial Mathematics and Fintech. |
publisher |
Springer, |
publishDate |
2022 |
physical |
1 online resource (XI, 359 p. 11 illus. :). |
edition |
1st edition. |
contents |
Chapter 1. Preparatory knowledge Chapter 2. The basis of code theory Chapter 3. Shannon theory Chapter 4. Cryptosystem and authentication system Chapter 5. Prime test Chapter 6. Elliptic curve Chapter 7. Lattice-based cryptography |
isbn |
981-19-0920-2 981-19-0919-9 |
callnumber-first |
H - Social Science |
callnumber-subject |
HG - Finance |
callnumber-label |
HG176 |
callnumber-sort |
HG 3176.7 |
illustrated |
Illustrated |
work_keys_str_mv |
AT zhengzhiyong moderncryptographyvolume1aclassicalintroductiontoinformationalandmathematicalprinciple |
status_str |
n |
ids_txt_mv |
(CKB)5850000000018210 EBL6954145 (AU-PeEL)EBL6954145 (MiAaPQ)EBC6954145 (oapen)https://directory.doabooks.org/handle/20.500.12854/81672 (EXLCZ)995850000000018210 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Financial Mathematics and Fintech. |
is_hierarchy_title |
Modern cryptography. Volume 1 : a classical introduction to informational and mathematical principle / |
container_title |
Financial Mathematics and Fintech. |
_version_ |
1796651961411436544 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03195nam a22005413u 4500</leader><controlfield tag="001">993545278904498</controlfield><controlfield tag="005">20230221122910.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr#|n|---|||||</controlfield><controlfield tag="008">220617s2022||||si a fo 000|0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981-19-0920-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5850000000018210</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">EBL6954145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(AU-PeEL)EBL6954145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6954145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/81672</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995850000000018210</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU-PeEL</subfield><subfield code="b">eng</subfield><subfield code="c">AU-PeEL</subfield><subfield code="d">AU-PeEL</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HG176.7</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zheng, Zhiyong</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modern cryptography. Volume 1 :</subfield><subfield code="b">a classical introduction to informational and mathematical principle /</subfield><subfield code="c">Zhiyong Zheng.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore :</subfield><subfield code="b">Springer,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (XI, 359 p. 11 illus. :).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Financial Mathematics and Fintech.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Preparatory knowledge Chapter 2. The basis of code theory Chapter 3. Shannon theory Chapter 4. Cryptosystem and authentication system Chapter 5. Prime test Chapter 6. Elliptic curve Chapter 7. Lattice-based cryptography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical characteristics and computational complexity theory of public key cryptography, focusing on the three main algorithms of public key cryptography, RSA, discrete logarithm and elliptic curve cryptosystem. It aims to indicate what it is and why it is. It systematically simplifies and combs the theory and technology of lattice cryptography, which is the greatest feature of this book. It requires a good knowledge in algebra, number theory and probability statistics for readers to read this book. The senior students majoring in mathematics, compulsory for cryptography and science and engineering postgraduates will find this book helpful. It can also be used as the main reference book for researchers in cryptography and cryptographic engineering areas.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer science</subfield><subfield code="x">Mathematics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Financial engineering.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social sciences</subfield><subfield code="x">Mathematics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Modern Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computational Complexity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hamming Distance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Shannon Theorem</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Source Coding Theorem</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Optimal Code Theory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Statistical Characteristics of Cryptosystem</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Elliptic Curve Public Key Cryptosystem</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Integer Lattice and Q-ary Lattice</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NTRU Cryptosystem and Ajtai/Dwork Cryptosystem</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">981-19-0919-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Financial Mathematics and Fintech.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 03:33:42 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-30 21:31:43 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337866200004498&Force_direct=true</subfield><subfield code="Z">5337866200004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337866200004498</subfield></datafield></record></collection> |