• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Cryptography for Secure Encryption » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2948695]
• Literatura piękna
 [1824038]

  więcej...
• Turystyka
 [70868]
• Informatyka
 [151073]
• Komiksy
 [35227]
• Encyklopedie
 [23181]
• Dziecięca
 [621575]
• Hobby
 [138961]
• AudioBooki
 [1642]
• Literatura faktu
 [228651]
• Muzyka CD
 [371]
• Słowniki
 [2933]
• Inne
 [445341]
• Kalendarze
 [1243]
• Podręczniki
 [164416]
• Poradniki
 [479493]
• Religia
 [510449]
• Czasopisma
 [502]
• Sport
 [61384]
• Sztuka
 [243086]
• CD, DVD, Video
 [3417]
• Technologie
 [219673]
• Zdrowie
 [100865]
• Książkowe Klimaty
 [124]
• Zabawki
 [2168]
• Puzzle, gry
 [3372]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7838]
Kategorie szczegółowe BISAC

Cryptography for Secure Encryption

ISBN-13: 9783030979041 / Angielski / Miękka / 2022

Robert G. Underwood
Cryptography for Secure Encryption Robert G. Underwood 9783030979041 Springer International Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Cryptography for Secure Encryption

ISBN-13: 9783030979041 / Angielski / Miękka / 2022

Robert G. Underwood
cena 200,77
(netto: 191,21 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych.

Darmowa dostawa!

This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level.  It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics (other than elementary programming skills) is not assumed. The book includes more material than can be covered in a single semester. The Preface provides a suggested outline for a single semester course, though instructors are encouraged to select their own topics to reflect their specific requirements and interests. Each chapter contains a set of carefully written exercises which prompts review of the material in the chapter and expands on the concepts.  Throughout the book, problems are stated mathematically, then algorithms are devised to solve the problems. Students are tasked to write computer programs (in C++ or GAP) to implement the algorithms.   The use of programming skills to solve practical problems adds extra value to the use of this text.This book combines mathematical theory with practical applications to computer information systems. The fundamental concepts of classical and modern cryptography are discussed in relation to probability theory, complexity theory, modern algebra, and number theory.  An overarching theme is cyber security:  security of the cryptosystems and the key generation and distribution protocols, and methods of cryptanalysis (i.e., code breaking). It contains chapters on probability theory, information theory and entropy, complexity theory, and the algebraic and number theoretic foundations of cryptography.  The book then reviews symmetric key cryptosystems, and discusses one-way trap door functions and public key cryptosystems including RSA and  ElGamal.  It contains a chapter on digital signature schemes, including material on message authentication and forgeries, and chapters on key generation and distribution. It contains a chapter on elliptic curve cryptography, including new material on the relationship between singular curves, algebraic groups and Hopf algebras.  

Kategorie:
Nauka, Matematyka
Kategorie BISAC:
Mathematics > Teoria liczb
Computers > Information Theory
Wydawca:
Springer International Publishing
Seria wydawnicza:
Universitext
Język:
Angielski
ISBN-13:
9783030979041
Rok wydania:
2022
Waga:
0.56 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka

"Each chapter contains a set of exercises of various degrees of difficulty that help summarize and review the main ideas of the chapter. The author finds that cryptographic algorithms and protocols provide good programming problems. In most of the places in the text, the author includes the GAP code for a better understanding of the subject in practical use. This book is self-contained and valuable to all audiences interested in cyber security subject." (Manish Kumar, zbMATH 1502.94004, 2023)

"One of the strengths of the book is the exercises. ... The exercises not only test the student's knowledge of the material in the chapter, but are fun to work on. ... Cryptography for Secure Encryption is an interesting theoretical book for mathematics and computer science students with solid backgrounds in mathematics. The exercises make the book very appealing." (Margaret B. Cozzens, MAA Reviews, January 29, 2023)

1. Introduction to Cryptography.- 2. Introduction to Probability.- 3. Information Theory and Entropy.- 4. Introduction to Complexity Theory.- 5. Algebraic Foundations: Groups-  6. Algebraic Foundations: Rings and Fields.- 7. Advanced Topics in Algebra.- 8.Symmetric Key Cryptography.-  9. Public Key Cryptography.- 10. Digital Signature Schemes.- 11. Key Generation.- 12. Key Distribution.- 13. Elliptic Curves in Cryptography.- 14. Singular Curves.- 15. Bibliography.- Index.

Robert G. Underwood is a Professor in both the Department of Mathematics and the Department of Computer Science in the College of Sciences at Auburn University at Montgomery.   His research in mathematics involves the classification of Hopf orders in group rings and the application of Hopf orders to Galois module theory.  His interests in Computer Science include cryptography and automata theory, specifically, algebraic generalizations of the Myhill-Nerode theorem.  Professor Underwood is the author of “Fundamentals of Hopf Algebras” and “An Introduction to Hopf Algebras."     

This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level. It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics (other than elementary programming skills) is not assumed. The book includes more material than can be covered in a single semester. The Preface provides a suggested outline for a single semester course, though instructors are encouraged to select their own topics to reflect their specific requirements and interests. Each chapter contains a set of carefully written exercises which prompts review of the material in the chapter and expands on the concepts. Throughout the book, problems are stated mathematically, then algorithms are devised to solve the problems. Students are tasked to write computer programs (in C++ or GAP) to implement the algorithms. The use of programming skills to solve practical problems adds extra value to the use of this text.


This book combines mathematical theory with practical applications to computer information systems. The fundamental concepts of classical and modern cryptography are discussed in relation to probability theory, complexity theory, modern algebra, and number theory. An overarching theme is cyber security: security of the cryptosystems and the key generation and distribution protocols, and methods of cryptanalysis (i.e., code breaking). It contains chapters on probability theory, information theory and entropy, complexity theory, and the algebraic and number theoretic foundations of cryptography. The book then reviews symmetric key cryptosystems, and discusses one-way trap door functions and public key cryptosystems including RSA and ElGamal. It contains a chapter on digital signature schemes, including material on message authentication and forgeries, and chapters on key generation and distribution. It contains a chapter on elliptic curve cryptography, including new material on the relationship between singular curves, algebraic groups and Hopf algebras.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia