An Introduction to Mathematical Cryptography

Nonfiction, Science & Nature, Mathematics, Number Theory, Computers, Advanced Computing, Theory
Cover of the book An Introduction to Mathematical Cryptography by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman ISBN: 9781493917112
Publisher: Springer New York Publication: September 11, 2014
Imprint: Springer Language: English
Author: Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
ISBN: 9781493917112
Publisher: Springer New York
Publication: September 11, 2014
Imprint: Springer
Language: English

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.

The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include:

  • classical cryptographic constructions, such as Diffie**–**Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures;

  • fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms;

  • an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem.

The second edition of An Introduction

to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.

The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include:

The second edition of An Introduction

to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.

More books from Springer New York

Cover of the book The Economic Impact of Public Support to Agriculture by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book The Radio Sky and How to Observe It by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Fire Hazard Assessment of Lithium Ion Battery Energy Storage Systems by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Shock-Wave Phenomena and the Properties of Condensed Matter by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Stochastic Narrow Escape in Molecular and Cellular Biology by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Vortex, Molecular Spin and Nanovorticity by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Anesthesia and Perioperative Care for Organ Transplantation by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Transatlantic Science and Technology by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Foot and Ankle Arthroscopy by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Divorced Fathers and Their Families by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Residue Reviews by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Reviews of Environmental Contamination and Toxicology Volume 211 by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Evaluation and Management of Blepharoptosis by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book Compilation and Synthesis for Embedded Reconfigurable Systems by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Cover of the book The Art of Progressive Censoring by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy