語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computational number theory and mode...
~
Yan, Song Y.
Computational number theory and modern cryptography[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8/2
書名/作者:
Computational number theory and modern cryptography/ Song Y. Yan.
作者:
Yan, Song Y.
出版者:
Hoboken : : John Wiley & Sons, Inc.,, 2013.
面頁冊數:
1 online resource.
標題:
Data encryption (Computer science)
標題:
Number theory - Data processing.
ISBN:
9781118188606 (electronic bk.)
ISBN:
1118188608 (electronic bk.)
ISBN:
9781118188590 (electronic bk.)
ISBN:
1118188594 (electronic bk.)
書目註:
Includes bibliographical references and index.
摘要、提要註:
"The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--
電子資源:
http://onlinelibrary.wiley.com/book/10.1002/9781118188606
Computational number theory and modern cryptography[electronic resource] /
Yan, Song Y.
Computational number theory and modern cryptography
[electronic resource] /Song Y. Yan. - Hoboken :John Wiley & Sons, Inc.,2013. - 1 online resource.
Includes bibliographical references and index.
"The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--
ISBN: 9781118188606 (electronic bk.)
LCCN: 2012042256Subjects--Topical Terms:
369827
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8/2
Computational number theory and modern cryptography[electronic resource] /
LDR
:03031cam a22003498i 4500
001
416014
003
OCoLC
005
20130505100516.0
006
m o d
007
cr |||||||||||
008
150205s2013 nju ob 001 0 eng
010
$a
2012042256
020
$a
9781118188606 (electronic bk.)
020
$a
1118188608 (electronic bk.)
020
$a
9781118188590 (electronic bk.)
020
$a
1118188594 (electronic bk.)
020
$z
9781118188613
020
$z
1118188616
020
$z
9781118188620
020
$z
1118188624
020
$z
9781118188583 (hardback)
035
$a
005417500
040
$a
DLC
$b
eng
$c
DLC
$d
DG1
$d
EBLCP
$d
N
050
1 0
$a
QA76.9.A25
082
0 0
$a
005.8/2
$2
23
100
1
$a
Yan, Song Y.
$3
587509
245
1 0
$a
Computational number theory and modern cryptography
$h
[electronic resource] /
$c
Song Y. Yan.
260
$a
Hoboken :
$b
John Wiley & Sons, Inc.,
$c
2013.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
520
$a
"The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--
$c
Provided by publisher.
520
$a
"This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"--
$c
Provided by publisher.
588
$a
Description based on print version record and CIP data provided by publisher; resource not viewed.
650
0
$a
Data encryption (Computer science)
$3
369827
650
0
$a
Number theory
$x
Data processing.
$3
587510
856
4 0
$u
http://onlinelibrary.wiley.com/book/10.1002/9781118188606
筆 0 讀者評論
多媒體
多媒體檔案
http://onlinelibrary.wiley.com/book/10.1002/9781118188606
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入