Mathematics of public key cryptography /
Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cambridge :
Cambridge University Press,
2012.
|
Subjects: | |
Online Access: | CONNECT CONNECT |
LEADER | 02623nam a22004098i 4500 | ||
---|---|---|---|
001 | mig00005067853 | ||
003 | UkCbUP | ||
005 | 20151005020624.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr|||||||||||| | ||
008 | 110203s2012||||enk o ||1 0|eng|d | ||
020 | |a 9781139012843 (ebook) | ||
020 | |z 9781107013926 (hardback) | ||
035 | 0 | 0 | |a ocm00000001camebacr9781139012843 |
040 | |a UkCbUP |b eng |e rda |c UkCbUP | ||
050 | 0 | 0 | |a QA268 |b .G35 2012 |
082 | 0 | 0 | |a 003/.54 |2 23 |
099 | |a Electronic book | ||
100 | 1 | |a Galbraith, Steven D., |e author. | |
245 | 1 | 0 | |a Mathematics of public key cryptography / |c Steven D. Galbraith. |
264 | 1 | |a Cambridge : |b Cambridge University Press, |c 2012. | |
300 | |a 1 online resource (xiv, 615 pages) : |b digital, PDF file(s). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015). | ||
520 | |a Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more. | ||
650 | 0 | |a Coding theory. | |
650 | 0 | |a Cryptography |x Mathematics. | |
730 | 0 | |a Cambridge EBA Collection | |
776 | 0 | 8 | |i Print version: |z 9781107013926 |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://doi.org/10.1017/CBO9781139012843 |z CONNECT |t 0 |
907 | |a 3906588 |b 08-25-20 |c 03-18-19 | ||
998 | |a wi |b 08-25-20 |c m |d z |e - |f eng |g enk |h 0 |i 2 | ||
999 | f | f | |i 6ec3fe02-7884-40be-9c08-1797482ff48a |s 55c0ffec-98f5-46fc-a081-49c0b7ab7327 |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e QA268 .G35 2012 |h Library of Congress classification |
856 | 4 | 0 | |t 0 |u https://ezproxy.mtsu.edu/login?url=https://doi.org/10.1017/CBO9781139012843 |z CONNECT |