Image from Google Jackets

CryptoSchool / by Joachim von zur Gathen.

By: Contributor(s): Material type: TextTextLanguage: İngilizce Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015Edition: 1st ed. 2015Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783662484258
Subject(s): LOC classification:
  • QA76.9.D35
Online resources:
Contents:
1 Introduction -- 2 Basic cryptosystems -- A Classical cryptology -- 3 The RSA cryptosystem -- B Key addition and modular arithmetic -- 4 Group cryptography and discrete logarithms -- 5 Elliptic curves -- C Breaking the unbreakable -- 6 Differential and linear cryptanalysis -- 7 Hash functions -- D Codebooks -- 8 Signatures -- 9 Security and reductions -- E Steganography -- 10 Identification and authentication -- F Transposition ciphers -- 11 Random generation -- G Some cryptographers -- 12 Proof systems and zero knowledge -- H People using cryptography -- 13 Integral lattices -- I The Zimmermann telegram -- 14 Quantum computation -- J Enigma, Turing, and Colossus -- 15 The computer algebra toolbox -- List of notation and sources of quotations, images, and ornaments -- Bibliography -- Index.
Summary: This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography — the art of making secure building blocks — and cryptanalysis — the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks. This text, based on lecture notes from the author’s many courses on the art of cryptography, consists of two interlinked parts. The first, modern part explains some of the basic systems used today and some attacks on them. However, a text on cryptology would not be complete without describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology. The first sections of this book can be used as a textbook for an introductory course to computer science or mathematics. Other sections are suitable for advanced undergraduate or graduate courses. Many exercises are included. The emphasis is on providing a (reasonably) complete explanation of the background for some selected systems. < Joachim von zur Gathen has held professorships at the universities of Toronto, Paderborn, and Bonn, each for more than a decade. He is now retired (and active). His numerous visiting professorships were in Australia, Chile, Germany, South Africa, Spain, Switzerland, Uruguay, and USA. He is founder and was editor-in-chief for 25 years of the journal computational complexity, and was on the editorial boards of several other journals. He is listed in various editions of Who's Who in the World.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Status Notes Date due Barcode
E-Book E-Book Merkez Kütüphane Merkez Kütüphane E-Kitap Koleksiyonu QA76.9.D35EBK (Browse shelf(Opens below)) Geçerli değil-e-Kitap / Not applicable-e-Book EBK00279

1 Introduction -- 2 Basic cryptosystems -- A Classical cryptology -- 3 The RSA cryptosystem -- B Key addition and modular arithmetic -- 4 Group cryptography and discrete logarithms -- 5 Elliptic curves -- C Breaking the unbreakable -- 6 Differential and linear cryptanalysis -- 7 Hash functions -- D Codebooks -- 8 Signatures -- 9 Security and reductions -- E Steganography -- 10 Identification and authentication -- F Transposition ciphers -- 11 Random generation -- G Some cryptographers -- 12 Proof systems and zero knowledge -- H People using cryptography -- 13 Integral lattices -- I The Zimmermann telegram -- 14 Quantum computation -- J Enigma, Turing, and Colossus -- 15 The computer algebra toolbox -- List of notation and sources of quotations, images, and ornaments -- Bibliography -- Index.

This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography — the art of making secure building blocks — and cryptanalysis — the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks. This text, based on lecture notes from the author’s many courses on the art of cryptography, consists of two interlinked parts. The first, modern part explains some of the basic systems used today and some attacks on them. However, a text on cryptology would not be complete without describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology. The first sections of this book can be used as a textbook for an introductory course to computer science or mathematics. Other sections are suitable for advanced undergraduate or graduate courses. Many exercises are included. The emphasis is on providing a (reasonably) complete explanation of the background for some selected systems. < Joachim von zur Gathen has held professorships at the universities of Toronto, Paderborn, and Bonn, each for more than a decade. He is now retired (and active). His numerous visiting professorships were in Australia, Chile, Germany, South Africa, Spain, Switzerland, Uruguay, and USA. He is founder and was editor-in-chief for 25 years of the journal computational complexity, and was on the editorial boards of several other journals. He is listed in various editions of Who's Who in the World.

There are no comments on this title.

to post a comment.
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.