Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fi…
CONTENTS 1. Overview of cryptography and its applications 2. Classical cryptosystems 3. Basic number theory 4. The data encryption standard 5. The advanced encryption standard : Rijndael 6. The RSA algorithm 7. Discrete logarithms 8. Hash functions 9. Digital signatures 10. Security protocols 11. Digital cash 12. Secret sharing schemes 13. Games 14. Zero-knowledge tec…
Edisi ketiga ini merupakan revisi dari edisi sebelumnya. Buku Introduction to cryptography: with coding theory edisi ketiga memadukan aspek terapan dan teoretis untuk membangun fondasi yang kuat dalam kriptografi dan keamanan komputer. Penulis menginformasikan cakupan topik yang luas dari sudut pandang matematika, dan mencerminkan tren terbaru dalam bidang kriptografi yang berubah dengan cepat.…
This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error…
Revolusi industri sudah merambah seluruh aspek kehidupan. Untuk menghadapi tantangan ini, tentu kita sebagai generasi milenial tidak bisa hanya duduk dan belajar melalui teks dan buku. Itu, sudah menjadi bahan pokok, yang kemudian harus diimbangi dengan pemahaman teknologi masa kini. DAFTAR ISI BAB 1 Peran Tekhnologi di Era Revolusi Industri 4.0 BAB 2 Tekhnologi dalam konsep pendidikan unt…
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Pa…
Termasuk bibliografi dan indeks. CONTENTS: 1. Coding for Reliable Digital Transmission and Storage. 2. Introduction to Algebra. 3. Linear Block Codes. 4. Important Linear Block Codes. 5. Cyclic Codes. 6. Binary BCH Codes. 7. Nonbinary BCH Codes, Reed-Solomon Codes, and Decoding Algorithms. 8. Majority-Logic Decodable Codes. 9. Trellises for Linear Block Codes. 10. Reliability-Base…
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.