000 02789nam a22003497a 4500
003 OSt
005 20250215145710.0
008 250215b |||||||| |||| 00| 0 hin d
020 _a9783030154516
040 _aNISER LIBRARY
_beng
_erda
_cNISER LIBRARY
082 _a003.26:512
_bCHI-C
100 1 _aChilds, Lindsay N.
245 0 0 _aCryptology and error correction :
_ban algebraic introduction and real-world applications
260 _aCham, Switzerland :
_bSpringer,
_c2019.
300 _axiv, 351 pages :
_billustrations (some color)
490 _aSpringer undergraduate texts in mathematics and technology,
_x1867-5506
504 _aIncludes bibliographical references and index.
520 _aThis text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods. The objective is to provide a thorough understanding of RSA, Diffie–Hellman, and Blum–Goldwasser cryptosystems and Hamming and Reed–Solomon error correction: how they are constructed, how they are made to work efficiently, and also how they can be attacked. To reach that level of understanding requires and motivates many ideas found in a first course in abstract algebra—rings, fields, finite abelian groups, basic theory of numbers, computational number theory, homomorphisms, ideals, and cosets. Those who complete this book will have gained a solid mathematical foundation for more specialized applied courses on cryptology or error correction, and should also be well prepared, both in concepts and in motivation, to pursue more advanced study in algebra and number theory. This text is suitable for classroom or online use or for independent study. Aimed at students in mathematics, computer science, and engineering, the prerequisite includes one or two years of a standard calculus sequence. Ideally the reader will also take a concurrent course in linear algebra or elementary matrix theory. A solutions manual for the 400 exercises in the book is available to instructors who adopt the text for their course.
650 _aAlgebra
650 _aCryptography
650 _aCryptology
650 _aData encryption (Computer science)
650 _aNumber theory
650 _aCaeser ciphers
650 _aChinese remainder theorem
650 _aEl Gamal cryptography
650 _aLuhn's formula
650 _aLagrange's theorem
856 _3Table of content
_uhttps://link.springer.com/content/pdf/bfm:978-3-030-15453-0/1
856 _3Reviews
_uhttps://www.goodreads.com/book/show/43976465-cryptology-and-error-correction?from_search=true&from_srp=true&qid=uYfmI4BdRA&rank=3#CommunityReviews
942 _2udc
_cBK
999 _c35668
_d35668