Algebraic Aspects of Cryptography by Neal Koblitz.

This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second ha...

Full description

Saved in:
Bibliographic Details
Main Author: Koblitz, Neal (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1998.
Edition:1st ed. 1998.
Series:Algorithms and Computation in Mathematics, 3
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3241111
003 MWH
005 20191022072759.0
007 cr nn 008mamaa
008 121205s1998 gw | s |||| 0|eng d
020 |a 9783662036426 
024 7 |a 10.1007/978-3-662-03642-6  |2 doi 
035 |a (DE-He213)978-3-662-03642-6 
050 4 |a E-Book 
072 7 |a UY  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a UY  |2 thema 
072 7 |a UYA  |2 thema 
100 1 |a Koblitz, Neal.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Algebraic Aspects of Cryptography  |h [electronic resource] /  |c by Neal Koblitz. 
250 |a 1st ed. 1998. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 1998. 
300 |a IX, 206 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Algorithms and Computation in Mathematics,  |x 1431-1550 ;  |v 3 
490 1 |a Springer eBook Collection 
505 0 |a 1. Cryptography -- §1. Early History -- §2. The Idea of Public Key Cryptography -- §3. The RSA Cryptosystem -- §4. Diffie-Hellman and the Digital Signature Algorithm -- §5. Secret Sharing, Coin Flipping, and Time Spent on Homework -- §6. Passwords, Signatures, and Ciphers -- §7. Practical Cryptosystems and Useful Impractical Ones -- 2. Complexity of Computations -- §1. The Big-O Notation -- §2. Length of Numbers -- §3. Time Estimates -- §4. P, NP, and NP-Completeness -- §5. Promise Problems -- §6. Randomized Algorithms and Complexity Classes -- §7. Some Other Complexity Classes -- 3. Algebra -- §1. Fields -- §2. Finite Fields -- §3. The Euclidean Algorithm for Polynomials -- §4. Polynomial Rings -- §5. Gröbner Bases -- 4. Hidden Monomial Cryptosystems -- § 1. The Imai-Matsumoto System -- §2. Patarin’s Little Dragon -- §3. Systems That Might Be More Secure -- 5. Combinatorial-Algebraic Cryptosystems -- §1. History -- §2. Irrelevance of Brassard’s Theorem -- §3. Concrete Combinatorial-Algebraic Systems -- §4. The Basic Computational Algebra Problem -- §5. Cryptographic Version of Ideal Membership -- §6. Linear Algebra Attacks -- §7. Designing a Secure System -- 6. Elliptic and Hyperelliptic Cryptosystems -- § 1. Elliptic Curves -- §2. Elliptic Curve Cryptosystems -- §3. Elliptic Curve Analogues of Classical Number Theory Problems -- §4. Cultural Background: Conjectures on Elliptic Curves and Surprising Relations with Other Problems -- §5. Hyperelliptic Curves -- §6. Hyperelliptic Cryptosystems -- §1. Basic Definitions and Properties -- §2. Polynomial and Rational Functions -- §3. Zeros and Poles -- §4. Divisors -- §5. Representing Semi-Reduced Divisors -- §6. Reduced Divisors -- §7. Adding Reduced Divisors -- Exercises -- Answers to Exercises. . 
520 |a This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: "... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D.Burmester, Mathematical Reviews 2002 "... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 "... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E.Leiss, Computing Reviews 1998. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computers. 
650 0 |a Number theory. 
650 0 |a Data structures (Computer science). 
650 0 |a Combinatorics. 
650 0 |a Data encryption (Computer science). 
690 |a Electronic resources (E-books) 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Algorithms and Computation in Mathematics,  |x 1431-1550 ;  |v 3 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-662-03642-6  |3 Click to view e-book  |t 0 
907 |a .b3241111x  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-SMA 
912 |a ZDB-2-BAE 
950 |a Mathematics and Statistics (Springer-11649) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i21542764  |z 02-26-20 
999 f f |i e8c3d435-18ef-522d-9452-ab37fee04791  |s 0a9c5055-4da5-55d0-896d-21ec904f3f94  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File