Amazon cover image
Image from Amazon.com

Cryptography Arithmetic [electronic resource] : Algorithms and Hardware Architectures /

By: Contributor(s): Material type: TextTextSeries: Advances in Information Security ; 77Publisher: Cham : Springer International Publishing : Imprint: Springer, 2020Edition: 1st ed. 2020Description: XIV, 336 p. 73 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030341428
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.73 23
  • 003.54 23
LOC classification:
  • QA76.9.D35
  • Q350-390
Online resources:
Contents:
1 Basic Computer Arithmetic -- 2 Mathematical Fundamentals I: Number Theory -- 3 Modular-Arithmetic Cryptosystems -- 4 Modular Reduction -- 5 Modular Addition and Multiplication -- 6 Modular Exponentiation, Inversion, and Division -- 7 Mathematical Fundamentals II: Abstract Algebra -- 8 Elliptic-Curve Basics -- 9 Elliptic-Curve Cryptosystems -- 10 Polynomial-basis arithmetic -- 11 Normal-basis arithmetic -- A Mathematical Proofs -- Index.
In: Springer Nature eBookSummary: Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

1 Basic Computer Arithmetic -- 2 Mathematical Fundamentals I: Number Theory -- 3 Modular-Arithmetic Cryptosystems -- 4 Modular Reduction -- 5 Modular Addition and Multiplication -- 6 Modular Exponentiation, Inversion, and Division -- 7 Mathematical Fundamentals II: Abstract Algebra -- 8 Elliptic-Curve Basics -- 9 Elliptic-Curve Cryptosystems -- 10 Polynomial-basis arithmetic -- 11 Normal-basis arithmetic -- A Mathematical Proofs -- Index.

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in