Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathematics. This text is devoted to the study of stochastic aspects of cryptology. Besides classical topics from cryptology, the author presents chapters on probabilistic prime number tests, factorization with quantum computers, random-number generators, …
"With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato."
Catatan: Terdapat Index Table of Contents: 1. Classical Cryptography 2. Shannon
Contents 1. Introduction 1.1 Cryptography: main topics 1.2 Some background from probability theory 1.3 The computational model 1.4 Motivation to the rigorous treatment 1.5 Miscellaneous 2. Computational difficulty 2.1 One- way functions: motivation 2.2 One-way functions: definitions 2.3 Weak one- way functions imply strong ones 2.4 One-way functions : variations 2.5 Hard-core pr…
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fi…
CONTENTS 1. Overview of cryptography and its applications 2. Classical cryptosystems 3. Basic number theory 4. The data encryption standard 5. The advanced encryption standard : Rijndael 6. The RSA algorithm 7. Discrete logarithms 8. Hash functions 9. Digital signatures 10. Security protocols 11. Digital cash 12. Secret sharing schemes 13. Games 14. Zero-knowledge tec…
Edisi ketiga ini merupakan revisi dari edisi sebelumnya. Buku Introduction to cryptography: with coding theory edisi ketiga memadukan aspek terapan dan teoretis untuk membangun fondasi yang kuat dalam kriptografi dan keamanan komputer. Penulis menginformasikan cakupan topik yang luas dari sudut pandang matematika, dan mencerminkan tren terbaru dalam bidang kriptografi yang berubah dengan cepat.…
This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error…