opac header image
Image from Google Jackets
Image from Coce

Algebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression

By: Slinko, ArkadiiMaterial type: TextTextSeries: Springer undergraduate mathematics seriesPublication details: Cham, Switzerland : Springer, 2020. Edition: 2nd editionDescription: xiv, 368 pages : 16 b/w illustrations, 1 illustrations in colourISBN: 9783030440732Subject(s): Algebra | Discrete mathematics | Information theory | Information and communication, circuits | Public key cryptography | Secret key cryptography | Reed-Solomon Codes | Huffman compression codeDDC classification: 512 Online resources: Table of content | Reviews Summary: Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationallyhard problems and giving insights into how computational complexity can be used to protect the integrity of data. The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.
List(s) this item appears in: Mathematics
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Book Book NISER LIBRARY
512 SLI-A (Browse shelf(Opens below)) Available 25801

Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationallyhard problems and giving insights into how computational complexity can be used to protect the integrity of data. The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.

There are no comments on this title.

to post a comment.
© 2025 Copyright: Customised and Maintained by Central Library NISER

Central Library, NISER Library Building, PO-Jatni, Khurda, Odisha - 752050, India | Email: libniser@niser.ac.in Phone: +91-674-2494171

Powered by Koha