Computational number theory and modern cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken
John Wiley & Sons, Inc.
2012
|
Schlagworte: | |
Online-Zugang: | FHA01 FRO01 Volltext |
Beschreibung: | "The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "-- "This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"-- Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 1118188594 1118188608 1118188616 1118188624 9781118188590 9781118188606 9781118188613 9781118188620 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041875630 | ||
003 | DE-604 | ||
005 | 20160801 | ||
007 | cr|uuu---uuuuu | ||
008 | 140523s2012 |||| o||u| ||||||eng d | ||
020 | |a 1118188594 |c electronic bk. |9 1-118-18859-4 | ||
020 | |a 1118188608 |c electronic bk. |9 1-118-18860-8 | ||
020 | |a 1118188616 |c electronic bk. |9 1-118-18861-6 | ||
020 | |a 1118188624 |9 1-118-18862-4 | ||
020 | |a 9781118188590 |c electronic bk. |9 978-1-118-18859-0 | ||
020 | |a 9781118188606 |c electronic bk. |9 978-1-118-18860-6 | ||
020 | |a 9781118188613 |c electronic bk. |9 978-1-118-18861-3 | ||
020 | |a 9781118188620 |9 978-1-118-18862-0 | ||
024 | 7 | |a 10.1002/9781118188606 |2 doi | |
035 | |a (OCoLC)813301159 | ||
035 | |a (DE-599)BVBBV041875630 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-861 | ||
082 | 0 | |a 005.8/2 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Yan, Song Y. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computational number theory and modern cryptography |c Prof. Song Y. Yan |
264 | 1 | |a Hoboken |b John Wiley & Sons, Inc. |c 2012 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "-- | ||
500 | |a "This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"-- | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Number theory / Data processing |2 fast | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Number theory / Data processing | |
650 | 0 | 7 | |a Zahlentheorie |0 (DE-588)4067277-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Zahlentheorie |0 (DE-588)4067277-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-118-18858-3 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606 |x Verlag |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q FHR_PDA_WIC | |
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027319813 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152219624275968 |
---|---|
any_adam_object | |
author | Yan, Song Y. |
author_facet | Yan, Song Y. |
author_role | aut |
author_sort | Yan, Song Y. |
author_variant | s y y sy syy |
building | Verbundindex |
bvnumber | BV041875630 |
classification_rvk | ST 276 |
collection | ZDB-35-WIC |
ctrlnum | (OCoLC)813301159 (DE-599)BVBBV041875630 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04412nmm a2200637zc 4500</leader><controlfield tag="001">BV041875630</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160801 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140523s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118188594</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-18859-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118188608</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-18860-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118188616</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-18861-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118188624</subfield><subfield code="9">1-118-18862-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118188590</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-18859-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118188606</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-18860-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118188613</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-18861-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118188620</subfield><subfield code="9">978-1-118-18862-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118188606</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)813301159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041875630</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yan, Song Y.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computational number theory and modern cryptography</subfield><subfield code="c">Prof. Song Y. Yan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Number theory / Data processing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory / Data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zahlentheorie</subfield><subfield code="0">(DE-588)4067277-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zahlentheorie</subfield><subfield code="0">(DE-588)4067277-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-118-18858-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FHR_PDA_WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027319813</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041875630 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:07:14Z |
institution | BVB |
isbn | 1118188594 1118188608 1118188616 1118188624 9781118188590 9781118188606 9781118188613 9781118188620 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027319813 |
oclc_num | 813301159 |
open_access_boolean | |
owner | DE-Aug4 DE-861 |
owner_facet | DE-Aug4 DE-861 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-35-WIC FHR_PDA_WIC UBG_PDA_WIC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Yan, Song Y. Verfasser aut Computational number theory and modern cryptography Prof. Song Y. Yan Hoboken John Wiley & Sons, Inc. 2012 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier "The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "-- "This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"-- Includes bibliographical references and index COMPUTERS / Security / Cryptography bisacsh Data encryption (Computer science) fast Number theory / Data processing fast Datenverarbeitung Data encryption (Computer science) Number theory / Data processing Zahlentheorie (DE-588)4067277-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Zahlentheorie (DE-588)4067277-3 s 1\p DE-604 Erscheint auch als Druck-Ausgabe, Hardcover 978-1-118-18858-3 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Yan, Song Y. Computational number theory and modern cryptography COMPUTERS / Security / Cryptography bisacsh Data encryption (Computer science) fast Number theory / Data processing fast Datenverarbeitung Data encryption (Computer science) Number theory / Data processing Zahlentheorie (DE-588)4067277-3 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4067277-3 (DE-588)4033329-2 |
title | Computational number theory and modern cryptography |
title_auth | Computational number theory and modern cryptography |
title_exact_search | Computational number theory and modern cryptography |
title_full | Computational number theory and modern cryptography Prof. Song Y. Yan |
title_fullStr | Computational number theory and modern cryptography Prof. Song Y. Yan |
title_full_unstemmed | Computational number theory and modern cryptography Prof. Song Y. Yan |
title_short | Computational number theory and modern cryptography |
title_sort | computational number theory and modern cryptography |
topic | COMPUTERS / Security / Cryptography bisacsh Data encryption (Computer science) fast Number theory / Data processing fast Datenverarbeitung Data encryption (Computer science) Number theory / Data processing Zahlentheorie (DE-588)4067277-3 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | COMPUTERS / Security / Cryptography Data encryption (Computer science) Number theory / Data processing Datenverarbeitung Zahlentheorie Kryptologie |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118188606 |
work_keys_str_mv | AT yansongy computationalnumbertheoryandmoderncryptography |