語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cryptography for secure encryption
~
Underwood, Robert G.
FindBook
Google Book
Amazon
博客來
Cryptography for secure encryption
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cryptography for secure encryption/ by Robert G. Underwood.
作者:
Underwood, Robert G.
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xii, 319 p. :ill. (chiefly col.), digital ;24 cm.
內容註:
1. Introduction to Cryptography -- 2. Introduction to Probability -- 3. Information Theory and Entropy -- 4. Introduction to Complexity Theory -- 5. Algebraic Foundations: Groups- 6. Algebraic Foundations: Rings and Fields -- 7. Advanced Topics in Algebra -- 8.Symmetric Key Cryptography -- 9. Public Key Cryptography -- 10. Digital Signature Schemes -- 11. Key Generation -- 12. Key Distribution -- 13. Elliptic Curves in Cryptography -- 14. Singular Curves -- 15. Bibliography -- Index.
Contained By:
Springer Nature eBook
標題:
Data encryption (Computer science) -
電子資源:
https://doi.org/10.1007/978-3-030-97902-7
ISBN:
9783030979027
Cryptography for secure encryption
Underwood, Robert G.
Cryptography for secure encryption
[electronic resource] /by Robert G. Underwood. - Cham :Springer International Publishing :2022. - xii, 319 p. :ill. (chiefly col.), digital ;24 cm. - Universitext,2191-6675. - Universitext..
1. Introduction to Cryptography -- 2. Introduction to Probability -- 3. Information Theory and Entropy -- 4. Introduction to Complexity Theory -- 5. Algebraic Foundations: Groups- 6. Algebraic Foundations: Rings and Fields -- 7. Advanced Topics in Algebra -- 8.Symmetric Key Cryptography -- 9. Public Key Cryptography -- 10. Digital Signature Schemes -- 11. Key Generation -- 12. Key Distribution -- 13. Elliptic Curves in Cryptography -- 14. Singular Curves -- 15. Bibliography -- Index.
This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level. It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics (other than elementary programming skills) is not assumed. The book includes more material than can be covered in a single semester. The Preface provides a suggested outline for a single semester course, though instructors are encouraged to select their own topics to reflect their specific requirements and interests. Each chapter contains a set of carefully written exercises which prompts review of the material in the chapter and expands on the concepts. Throughout the book, problems are stated mathematically, then algorithms are devised to solve the problems. Students are tasked to write computer programs (in C++ or GAP) to implement the algorithms. The use of programming skills to solve practical problems adds extra value to the use of this text. This book combines mathematical theory with practical applications to computer information systems. The fundamental concepts of classical and modern cryptography are discussed in relation to probability theory, complexity theory, modern algebra, and number theory. An overarching theme is cyber security: security of the cryptosystems and the key generation and distribution protocols, and methods of cryptanalysis (i.e., code breaking) It contains chapters on probability theory, information theory and entropy, complexity theory, and the algebraic and number theoretic foundations of cryptography. The book then reviews symmetric key cryptosystems, and discusses one-way trap door functions and public key cryptosystems including RSA and ElGamal. It contains a chapter on digital signature schemes, including material on message authentication and forgeries, and chapters on key generation and distribution. It contains a chapter on elliptic curve cryptography, including new material on the relationship between singular curves, algebraic groups and Hopf algebras.
ISBN: 9783030979027
Standard No.: 10.1007/978-3-030-97902-7doiSubjects--Topical Terms:
579162
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cryptography for secure encryption
LDR
:03725nmm a2200337 a 4500
001
2300723
003
DE-He213
005
20220603173619.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030979027
$q
(electronic bk.)
020
$a
9783030979010
$q
(paper)
024
7
$a
10.1007/978-3-030-97902-7
$2
doi
035
$a
978-3-030-97902-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
PBH
$2
bicssc
072
7
$a
MAT022000
$2
bisacsh
072
7
$a
PBH
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
U56 2022
100
1
$a
Underwood, Robert G.
$3
1324879
245
1 0
$a
Cryptography for secure encryption
$h
[electronic resource] /
$c
by Robert G. Underwood.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xii, 319 p. :
$b
ill. (chiefly col.), digital ;
$c
24 cm.
490
1
$a
Universitext,
$x
2191-6675
505
0
$a
1. Introduction to Cryptography -- 2. Introduction to Probability -- 3. Information Theory and Entropy -- 4. Introduction to Complexity Theory -- 5. Algebraic Foundations: Groups- 6. Algebraic Foundations: Rings and Fields -- 7. Advanced Topics in Algebra -- 8.Symmetric Key Cryptography -- 9. Public Key Cryptography -- 10. Digital Signature Schemes -- 11. Key Generation -- 12. Key Distribution -- 13. Elliptic Curves in Cryptography -- 14. Singular Curves -- 15. Bibliography -- Index.
520
$a
This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level. It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics (other than elementary programming skills) is not assumed. The book includes more material than can be covered in a single semester. The Preface provides a suggested outline for a single semester course, though instructors are encouraged to select their own topics to reflect their specific requirements and interests. Each chapter contains a set of carefully written exercises which prompts review of the material in the chapter and expands on the concepts. Throughout the book, problems are stated mathematically, then algorithms are devised to solve the problems. Students are tasked to write computer programs (in C++ or GAP) to implement the algorithms. The use of programming skills to solve practical problems adds extra value to the use of this text. This book combines mathematical theory with practical applications to computer information systems. The fundamental concepts of classical and modern cryptography are discussed in relation to probability theory, complexity theory, modern algebra, and number theory. An overarching theme is cyber security: security of the cryptosystems and the key generation and distribution protocols, and methods of cryptanalysis (i.e., code breaking) It contains chapters on probability theory, information theory and entropy, complexity theory, and the algebraic and number theoretic foundations of cryptography. The book then reviews symmetric key cryptosystems, and discusses one-way trap door functions and public key cryptosystems including RSA and ElGamal. It contains a chapter on digital signature schemes, including material on message authentication and forgeries, and chapters on key generation and distribution. It contains a chapter on elliptic curve cryptography, including new material on the relationship between singular curves, algebraic groups and Hopf algebras.
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Cryptography.
$3
532586
650
1 4
$a
Number Theory.
$3
891078
650
2 4
$a
Coding and Information Theory.
$3
891252
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Universitext.
$3
812115
856
4 0
$u
https://doi.org/10.1007/978-3-030-97902-7
950
$a
Mathematics and Statistics (SpringerNature-11649)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9442615
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入