LEADER 00914nam0-22003131i-450- 001 990003080120403321 005 20041123111648.0 010 $a0-88134-121-5 035 $a000308012 035 $aFED01000308012 035 $a(Aleph)000308012FED01 035 $a000308012 100 $a20030910d1984----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $aa-------001yy 200 1 $aFire in the Valley$ethe making of the personal computer$fPaul Freiberger, Michael Swaine 210 $aBerkeley [Cal.]$cOsborne/Mc Graw-Hill$d1984 215 $aXIII, 288 p.$cill. : fot.$d24 cm 610 0 $aIndustria elettronica 700 1$aFreiberger,$bPaul$0122817 701 1$aSwaine,$bMichael$0122818 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003080120403321 952 $aH/2.2243 FRE$b2884$fSES 959 $aSES 996 $aFire in the Valley$9459991 997 $aUNINA LEADER 05563nam 22008295 450 001 9910299983103321 005 20250609214054.0 010 $a1-4939-1711-0 024 7 $a10.1007/978-1-4939-1711-2 035 $a(CKB)3710000000249654 035 $a(SSID)ssj0001354168 035 $a(PQKBManifestationID)11868613 035 $a(PQKBTitleCode)TC0001354168 035 $a(PQKBWorkID)11327128 035 $a(PQKB)10355552 035 $a(DE-He213)978-1-4939-1711-2 035 $a(MiAaPQ)EBC6312071 035 $a(MiAaPQ)EBC5594976 035 $a(Au-PeEL)EBL5594976 035 $a(OCoLC)890693282 035 $a(PPN)181352974 035 $a(EXLCZ)993710000000249654 100 $a20140911d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 13$aAn Introduction to Mathematical Cryptography /$fby Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman 205 $a2nd ed. 2014. 210 1$aNew York, NY :$cSpringer New York :$cImprint: Springer,$d2014. 215 $a1 online resource (XVII, 538 p. 32 illus.) 225 1 $aUndergraduate Texts in Mathematics,$x0172-6056 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a1-4939-1710-2 320 $aIncludes bibliographical references (pages [507]-516) and index. 327 $aPreface -- Introduction -- 1 An Introduction to Cryptography -- 2 Discrete Logarithms and Diffie-Hellman -- 3 Integer Factorization and RSA -- 4 Digital Signatures -- 5 Combinatorics, Probability, and Information Theory -- 6 Elliptic Curves and Cryptography -- 7 Lattices and Cryptography -- 8 Additional Topics in Cryptography -- List of Notation -- References -- Index. 330 $aThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie?Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included. 410 0$aUndergraduate Texts in Mathematics,$x0172-6056 606 $aNumber theory 606 $aData structures (Computer science) 606 $aData encryption (Computer science) 606 $aInformation theory 606 $aAlgebra 606 $aOrdered algebraic structures 606 $aNumber Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/M25001 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation and Communication, Circuits$3https://scigraph.springernature.com/ontologies/product-market-codes/M13038 606 $aOrder, Lattices, Ordered Algebraic Structures$3https://scigraph.springernature.com/ontologies/product-market-codes/M11124 615 0$aNumber theory. 615 0$aData structures (Computer science) 615 0$aData encryption (Computer science) 615 0$aInformation theory. 615 0$aAlgebra. 615 0$aOrdered algebraic structures. 615 14$aNumber Theory. 615 24$aData Structures and Information Theory. 615 24$aCryptology. 615 24$aInformation and Communication, Circuits. 615 24$aOrder, Lattices, Ordered Algebraic Structures. 676 $a652.80151 700 $aHoffstein$b Jeffrey$4aut$4http://id.loc.gov/vocabulary/relators/aut$0503901 702 $aPipher$b Jill Catherine$f1955-$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aSilverman$b Joseph H$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299983103321 996 $aAn Introduction to Mathematical Cryptography$92541507 997 $aUNINA