000 02944cam a22003258i 4500
001 17495006
005 20230920020002.0
008 121015s2012 nju b 001 0 eng
010 _a 2012032708
020 _a9781118188583
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bY358 2012
082 0 0 _a005.82
_223
_bYAN-C
084 _aCOM083000
_2bisacsh
100 1 _aYan, Song Y.
245 1 0 _aComputational number theory and modern cryptography
_cProf. Song Y. Yan.
263 _a1111
300 _axii, 418 p.
504 _aIncludes bibliographical references and index.
520 _a"The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--
520 _a"This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"--
650 0 _aData encryption (Computer science)
650 0 _aNumber theory
_xData processing.
650 7 _aCOMPUTERS / Security / Cryptography.
_2bisacsh
856 4 2 _3Cover image
_uhttp://catalogimages.wiley.com/images/db/jimages/9781118188583.jpg
906 _a0
_bvip
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_01
999 _c7456
_d7456