Normal view

# Elementary Number Theory, Cryptography and Codes [electronic resource] / by Maria Welleda Baldoni, Ciro Ciliberto, Giulia Maria Piacentini Cattaneo.

Material type: TextSeries: Universitext: Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009Description: XVI, 522 p. 10 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540692003Additional physical formats: Printed edition:: No titleDDC classification: 512.7 LOC classification: QA241-247.5Online resources: Click here to access online
Contents:
A round-up on numbers -- Computational complexity -- From infinite to finite -- Finite is not enough: factoring integers -- Finite fields and polynomial congruences -- Primality and factorisation tests -- Secrets… and lies -- Transmitting without…fear of errors -- The future is already here: quantum cryptography.
Summary: In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic residues, primality tests, continued fractions, etc.) which in recent years have proven to be extremely useful for applications to cryptography and coding theory. Both cryptography and codes have crucial applications in our daily lives, and they are described here, while the complexity problems that arise in implementing the related numerical algorithms are also taken into due account. Cryptography has been developed in great detail, both in its classical and more recent aspects. In particular public key cryptography is extensively discussed, the use of algebraic geometry, specifically of elliptic curves over finite fields, is illustrated, and a final chapter is devoted to quantum cryptography, which is the new frontier of the field. Coding theory is not discussed in full; however a chapter, sufficient for a good introduction to the subject, has been devoted to linear codes. Each chapter ends with several complements and with an extensive list of exercises, the solutions to most of which are included in the last chapter. Though the book contains advanced material, such as cryptography on elliptic curves, Goppa codes using algebraic curves over finite fields, and the recent AKS polynomial primality test, the authors' objective has been to keep the exposition as self-contained and elementary as possible. Therefore the book will be useful to students and researchers, both in theoretical (e.g. mathematicians) and in applied sciences (e.g. physicists, engineers, computer scientists, etc.) seeking a friendly introduction to the important subjects treated here. The book will also be useful for teachers who intend to give courses on these topics.
Tags from this library: No tags from this library for this title.
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

A round-up on numbers -- Computational complexity -- From infinite to finite -- Finite is not enough: factoring integers -- Finite fields and polynomial congruences -- Primality and factorisation tests -- Secrets… and lies -- Transmitting without…fear of errors -- The future is already here: quantum cryptography.

In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic residues, primality tests, continued fractions, etc.) which in recent years have proven to be extremely useful for applications to cryptography and coding theory. Both cryptography and codes have crucial applications in our daily lives, and they are described here, while the complexity problems that arise in implementing the related numerical algorithms are also taken into due account. Cryptography has been developed in great detail, both in its classical and more recent aspects. In particular public key cryptography is extensively discussed, the use of algebraic geometry, specifically of elliptic curves over finite fields, is illustrated, and a final chapter is devoted to quantum cryptography, which is the new frontier of the field. Coding theory is not discussed in full; however a chapter, sufficient for a good introduction to the subject, has been devoted to linear codes. Each chapter ends with several complements and with an extensive list of exercises, the solutions to most of which are included in the last chapter. Though the book contains advanced material, such as cryptography on elliptic curves, Goppa codes using algebraic curves over finite fields, and the recent AKS polynomial primality test, the authors' objective has been to keep the exposition as self-contained and elementary as possible. Therefore the book will be useful to students and researchers, both in theoretical (e.g. mathematicians) and in applied sciences (e.g. physicists, engineers, computer scientists, etc.) seeking a friendly introduction to the important subjects treated here. The book will also be useful for teachers who intend to give courses on these topics.

There are no comments for this item.