Language:
English
繁體中文
Help
Login
Back
to Search results for
[ subject:"correction." ]
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptology and Error Correction = An...
~
Childs, Lindsay N.
Cryptology and Error Correction = An Algebraic Introduction and Real-World Applications /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cryptology and Error Correction/ by Lindsay N. Childs.
Reminder of title:
An Algebraic Introduction and Real-World Applications /
Author:
Childs, Lindsay N.
Description:
XIV, 351 p. 7 illus., 1 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Algebra. -
Online resource:
https://doi.org/10.1007/978-3-030-15453-0
ISBN:
9783030154530
Cryptology and Error Correction = An Algebraic Introduction and Real-World Applications /
Childs, Lindsay N.
Cryptology and Error Correction
An Algebraic Introduction and Real-World Applications /[electronic resource] :by Lindsay N. Childs. - 1st ed. 2019. - XIV, 351 p. 7 illus., 1 illus. in color.online resource. - Springer Undergraduate Texts in Mathematics and Technology,1867-5506. - Springer Undergraduate Texts in Mathematics and Technology,.
Preface -- 1. Secure, Reliable Information -- 2. Modular Arithmetic -- 3. Linear Equations Modulo m -- 4. Unique Factorization in Z -- 5. Rings and Fields -- 6. Polynomials -- 7. Matrices and Hamming Codes -- 8. Orders and Euler's theorem -- 9. RSA Cryptography and Prime Numbers -- 10. Groups, Cosets, and Lagrange's theorem -- 11. Solving Systems of Congruences -- 12. Homomorphisms and Euler's Phi function -- 13. Cyclic Groups and Cryptography -- 14. Applications of Cosets -- 15. An Introduction to Reed–Solomon codes -- 16. Blum–Goldwasser Cryptography -- 17. Factoring by the Quadratic Sieve -- 18. Polynomials and Finite Fields -- 19. Reed-Solomon Codes II -- Bibliography. .
This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods. The objective is to provide a thorough understanding of RSA, Diffie–Hellman, and Blum–Goldwasser cryptosystems and Hamming and Reed–Solomon error correction: how they are constructed, how they are made to work efficiently, and also how they can be attacked. To reach that level of understanding requires and motivates many ideas found in a first course in abstract algebra—rings, fields, finite abelian groups, basic theory of numbers, computational number theory, homomorphisms, ideals, and cosets. Those who complete this book will have gained a solid mathematical foundation for more specialized applied courses on cryptology or error correction, and should also be well prepared, both in concepts and in motivation, to pursue more advanced study in algebra and number theory. This text is suitable for classroom or online use or for independent study. Aimed at students in mathematics, computer science, and engineering, the prerequisite includes one or two years of a standard calculus sequence. Ideally the reader will also take a concurrent course in linear algebra or elementary matrix theory. A solutions manual for the 400 exercises in the book is available to instructors who adopt the text for their course.
ISBN: 9783030154530
Standard No.: 10.1007/978-3-030-15453-0doiSubjects--Topical Terms:
579870
Algebra.
LC Class. No.: QA150-272
Dewey Class. No.: 512
Cryptology and Error Correction = An Algebraic Introduction and Real-World Applications /
LDR
:03576nam a22003975i 4500
001
1007918
003
DE-He213
005
20200703044234.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030154530
$9
978-3-030-15453-0
024
7
$a
10.1007/978-3-030-15453-0
$2
doi
035
$a
978-3-030-15453-0
050
4
$a
QA150-272
072
7
$a
PBF
$2
bicssc
072
7
$a
MAT002000
$2
bisacsh
072
7
$a
PBF
$2
thema
082
0 4
$a
512
$2
23
100
1
$a
Childs, Lindsay N.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
896658
245
1 0
$a
Cryptology and Error Correction
$h
[electronic resource] :
$b
An Algebraic Introduction and Real-World Applications /
$c
by Lindsay N. Childs.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XIV, 351 p. 7 illus., 1 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Springer Undergraduate Texts in Mathematics and Technology,
$x
1867-5506
505
0
$a
Preface -- 1. Secure, Reliable Information -- 2. Modular Arithmetic -- 3. Linear Equations Modulo m -- 4. Unique Factorization in Z -- 5. Rings and Fields -- 6. Polynomials -- 7. Matrices and Hamming Codes -- 8. Orders and Euler's theorem -- 9. RSA Cryptography and Prime Numbers -- 10. Groups, Cosets, and Lagrange's theorem -- 11. Solving Systems of Congruences -- 12. Homomorphisms and Euler's Phi function -- 13. Cyclic Groups and Cryptography -- 14. Applications of Cosets -- 15. An Introduction to Reed–Solomon codes -- 16. Blum–Goldwasser Cryptography -- 17. Factoring by the Quadratic Sieve -- 18. Polynomials and Finite Fields -- 19. Reed-Solomon Codes II -- Bibliography. .
520
$a
This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods. The objective is to provide a thorough understanding of RSA, Diffie–Hellman, and Blum–Goldwasser cryptosystems and Hamming and Reed–Solomon error correction: how they are constructed, how they are made to work efficiently, and also how they can be attacked. To reach that level of understanding requires and motivates many ideas found in a first course in abstract algebra—rings, fields, finite abelian groups, basic theory of numbers, computational number theory, homomorphisms, ideals, and cosets. Those who complete this book will have gained a solid mathematical foundation for more specialized applied courses on cryptology or error correction, and should also be well prepared, both in concepts and in motivation, to pursue more advanced study in algebra and number theory. This text is suitable for classroom or online use or for independent study. Aimed at students in mathematics, computer science, and engineering, the prerequisite includes one or two years of a standard calculus sequence. Ideally the reader will also take a concurrent course in linear algebra or elementary matrix theory. A solutions manual for the 400 exercises in the book is available to instructors who adopt the text for their course.
650
0
$a
Algebra.
$2
gtt
$3
579870
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Number theory.
$3
527883
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Number Theory.
$3
672023
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030154516
776
0 8
$i
Printed edition:
$z
9783030154523
830
0
$a
Springer Undergraduate Texts in Mathematics and Technology,
$x
1867-5506
$3
1255131
856
4 0
$u
https://doi.org/10.1007/978-3-030-15453-0
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login