CryptoSchool

 HC runder Rücken kaschiert
Print on Demand | Lieferzeit: Print on Demand - Lieferbar innerhalb von 3-5 Werktagen I
Alle Preise inkl. MwSt. | Versandkostenfrei
Nicht verfügbar Zum Merkzettel
Gewicht:
1640 g
Format:
241x160x50 mm
Beschreibung:

Joachim von zur Gathen has taught about fifty courses on various topics in cryptology. His lively and interactive style has encouraged several original contributions by students throughout the book. His research is in cryptology, computer algebra, finite fields, algorithmics, and complexity theory.

The author has held professorships at the universities of Toronto, Paderborn, and Bonn, each for more than a decade. He is now retired (and active). Visiting professorships include Australia (Canberra, Sydney), Chile (Santiago, Concepción), Germany (Saarbrücken), South Africa (Johannesburg), Spain (Alcalà, Santander), Switzerland (ETH and Universität Zürich), Uruguay (Montevideo), and USA (Berkeley). 

He is founder and was editor-in-chief for 25 years of the journal computational complexity, and was on the editorial boards of the journals Codes and Cryptography, Finite Fields and Their Applications, Journal of Symbolic Computation, and SIAM Journal of Computing.He is listed in various editions of Who's Who in the World.

His previous work includes the book "Modern Computer Algebra" that has been called "the bible of computer algebra" and has been cited in over 2000 articles.

Basic and advanced cryptographic methods with complete underpinnings
1 Introduction.- 2 Basic cryptosystems.- A Classical cryptology.- 3 The RSA cryptosystem.- B Key addition and modular arithmetic.- 4 Group cryptography and discrete logarithms.- 5 Elliptic curves.- C Breaking the unbreakable.- 6 Differential and linear cryptanalysis.- 7 Hash functions.- D Codebooks.- 8 Signatures.- 9 Security and reductions.- E Steganography.- 10 Identification and authentication.- F Transposition ciphers.- 11 Random generation.- G Some cryptographers.- 12 Proof systems and zero knowledge.- H People using cryptography.- 13 Integral lattices.- I The Zimmermann telegram.- 14 Quantum computation.- J Enigma, Turing, and Colossus.- 15 The computer algebra toolbox.- List of notation and sources of quotations, images, and ornaments.- Bibliography.- Index.

This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography---the art of making secure building blocks---and cryptanalysis---the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks. 

This text, based on lecture notes from the author's many courses on the art of cryptography, consists of two interlinked parts. The first, modern part explains some of the basic systems used today and some attacks on them. However, a text on cryptology would not be complete without describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology.

The first sections of this book can be used as a textbook for an introductory course to computer science or mathematics students. Other sections are suitable for advanced undergraduate or graduate courses. Many exercises are included. The emphasis is on providing reasonably complete explanation of the background for some selected systems.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.