» » Mathematical Foundations of Public Key Cryptography

Information of news
  • Author: Alexandr
  • Date: 19-10-2015, 00:17
19-10-2015, 00:17

Mathematical Foundations of Public Key Cryptography

Category: E-Books

Mathematical Foundations of Public Key Cryptography

Mathematical Foundations of Public Key Cryptography by Xiaoyun Wang
English | 30 Oct. 2015 | ISBN: 1498702236 | 236 Pages | AZW4/PDF (True) | 5.32 MB

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research & teaching experience to help students bridge the gap between math theory & crypto practice.

The book provides a theoretical structure of fundamental number theory & algebra knowledge supporting public-key cryptography.

Rather than simply combining number theory & modern algebra, this textbook features the interdisciplinary characteristics of cryptography―revealing the integrations of mathematical theories & public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic & algebraic algorithms & their complexities to provide a preliminary underst&ing of the applications of mathematical theories in cryptographic algorithms.

Supplying a seamless integration of cryptography & mathematics, the book includes coverage of elementary number theory; algebraic structure & attributes of group, ring, & field; cryptography-related computing complexity & basic algorithms, as well as lattice & fundamental methods of lattice cryptanalysis.

The text consists of 11 chapters. Basic theory & tools of elementary number theory, such as congruences, primitive roots, residue classes, & continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, & fields & their properties are explained.

Chapter 10 is about computational complexities of several related mathematical algorithms, & hard problems such as integer factorization & discrete logarithm. Chapter 11 presents the basics of lattice theory & the lattice basis reduction algorithm―the LLL algorithm & its application in the cryptanalysis of the RSA algorithm.

Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students & first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

(Buy premium account for maximum speed and resumming ability)



Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.

Tag Cloud

archive of news

free html hit counter