Mathematics of public key cryptography /

Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students...

Full description

Saved in:
Bibliographic Details
Main Author: Galbraith, Steven D. (Author)
Format: eBook
Language:English
Published: Cambridge : Cambridge University Press, 2012.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 02623nam a22004098i 4500
001 mig00005067853
003 UkCbUP
005 20151005020624.0
006 m|||||o||d||||||||
007 cr||||||||||||
008 110203s2012||||enk o ||1 0|eng|d
020 |a 9781139012843 (ebook) 
020 |z 9781107013926 (hardback) 
035 0 0 |a ocm00000001camebacr9781139012843 
040 |a UkCbUP  |b eng  |e rda  |c UkCbUP 
050 0 0 |a QA268  |b .G35 2012 
082 0 0 |a 003/.54  |2 23 
099 |a Electronic book 
100 1 |a Galbraith, Steven D.,  |e author. 
245 1 0 |a Mathematics of public key cryptography /  |c Steven D. Galbraith. 
264 1 |a Cambridge :  |b Cambridge University Press,  |c 2012. 
300 |a 1 online resource (xiv, 615 pages) :  |b digital, PDF file(s). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from publisher's bibliographic system (viewed on 05 Oct 2015). 
520 |a Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more. 
650 0 |a Coding theory. 
650 0 |a Cryptography  |x Mathematics. 
730 0 |a Cambridge EBA Collection 
776 0 8 |i Print version:   |z 9781107013926 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://doi.org/10.1017/CBO9781139012843  |z CONNECT  |t 0 
907 |a 3906588  |b 08-25-20  |c 03-18-19 
998 |a wi  |b 08-25-20  |c m  |d z   |e -  |f eng  |g enk  |h 0  |i 2 
999 f f |i 6ec3fe02-7884-40be-9c08-1797482ff48a  |s 55c0ffec-98f5-46fc-a081-49c0b7ab7327  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA268 .G35 2012  |h Library of Congress classification 
856 4 0 |t 0  |u https://ezproxy.mtsu.edu/login?url=https://doi.org/10.1017/CBO9781139012843  |z CONNECT