Shortcuts
Please wait while page loads.
SISSA Library . Default .
PageMenu- Main Menu-
Page content

Catalogue Display

Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression

Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression
Catalogue Information
Field name Details
Dewey Class 512
Title Algebra for Applications ([EBook]) : Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression / / by Arkadii Slinko.
Author Slinko, Arkadii
Other name(s) SpringerLink (Online service)
Edition statement 2nd ed. 2020.
Publication Cham : : Springer International Publishing : : Imprint: Springer, , 2020.
Physical Details XIV, 368 p. 17 illus., 1 illus. in color. : online resource.
Series Springer undergraduate mathematics series 1615-2085
ISBN 9783030440749
Summary Note Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationally hard problems and giving insights into how computational complexity can be used to protect the integrity of data. The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.:
Contents note 1 Integers -- 2 Cryptology -- 3 Groups -- 4 Fields -- 5 Polynomials -- 6 Secret Sharing -- 7 Error-Correcting Codes -- 8 Compression -- Appendix A: GAP -- Appendix B: Miscellanea -- Solutions to Exercises -- Index.
Mode of acces to digital resource Digital book. Cham Springer Nature 2020. - Mode of access: World Wide Web. System requirements: Internet Explorer 6.0 (or higher) or Firefox 2.0 (or higher). Available as searchable text in PDF format
System details note - Online access to this digital book is restricted to subscription institutions through IP address (only for SISSA internal users).
Internet Site https://doi.org/10.1007/978-3-030-44074-9
Links to Related Works
Subject References:
Authors:
Corporate Authors:
Series:
Classification:
Catalogue Information 50216 Beginning of record . Catalogue Information 50216 Top of page .

Reviews


This item has not been rated.    Add a Review and/or Rating50216
Quick Search