A Course in Mathematical Cryptography

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as - Group-Based Cryptography - Gröbner Basis Methods in Cryptography - Lattice-Based Cryptography

Author(s): Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger
Series: De Gruyter Graduate
Publisher: Walter de Gruyter
Year: 2015

Language: English
Pages: XIV+376
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;

1 Basic Ideas of Cryptography
2 Symmetric Key Cryptosystems
3 Cryptanalysis and Complexity
4 Cryptographic Protocols
5 Elementary Number Theoretic Techniques
6 Some Number Theoretic Algorithms
7 Public Key Cryptography
8 Elliptic Curve Cryptography
9 Basic Concepts from Group Theory
10 Non-Commutative Group Based Cryptography
11 Platform Groups and Braid Group Cryptography
12 Further Applications Using Group Theory
13 Commutative Gröbner Basis Methods
14 Non-Commutative Gröbner Basis Methods
15 Lattice-Based Cryptography