Amazon cover image
Image from Amazon.com

Computational number theory and modern cryptography

By: Material type: TextTextDescription: xii, 418 pISBN:
  • 9781118188583
Subject(s): DDC classification:
  • 005.82 23 YAN-C
LOC classification:
  • QA76.9.A25 Y358 2012
Other classification:
  • COM083000
Online resources: Summary: "The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--Summary: "This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Books Books IIITD Reference Computer Science and Engineering REF 005.82 YAN-C (Browse shelf(Opens below)) Checked out 01/10/2024 001452
Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.82 STI-C Cryptography : REF 005.82 STI-C Cryptography : REF 005.82 TRA-I Introduction to cryptography with coding theory REF 005.82 YAN-C Computational number theory and modern cryptography REF 005.84 YIN-A Automatic malware analysis : REF 006 CON-M Machine learning for hackers REF 006.22 KOO-B Better embedded system software

Includes bibliographical references and index.

"The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--

"This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"--

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in