LEADER 04453nam 22006135 450 001 9910485593303321 005 20251113191417.0 010 $a3-030-73492-7 024 7 $a10.1007/978-3-030-73492-3 035 $a(CKB)5590000000487555 035 $a(MiAaPQ)EBC6643450 035 $a(Au-PeEL)EBL6643450 035 $a(OCoLC)1257292106 035 $a(PPN)258856165 035 $a(DE-He213)978-3-030-73492-3 035 $a(EXLCZ)995590000000487555 100 $a20210615d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFundamentals of Cryptography $eIntroducing Mathematical and Algorithmic Foundations /$fby Duncan Buell 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (283 pages) 225 1 $aUndergraduate Topics in Computer Science,$x2197-1781 311 08$a3-030-73491-9 327 $a1. Introduction -- 2. Simple Ciphers -- 3. Divisibility, Congruences, and Modular Arithmetic -- 4. Groups, Rings, Fields -- 5. Square Roots and Quadratic Symbols -- 6. Finite Fields of Characteristic 2 -- 7. Elliptic Curves -- 8. Mathematics, Computing, and Arithmetic -- 9. Modern Symmetric Ciphers ? DES and AES -- 10. Asymmetric Ciphers ? RSA and Others -- 11. How to Factor a Number -- 12. How to Factor More Effectively -- 13. Cycles, Randomness, Discrete Logarithms, and Key Exchange -- 14. Elliptic Curve Cryptography -- 15. Quantum Computing and Cryptography -- 16. Lattice-Based Cryptography -- 17. Homomorphic Encryption -- 18. Exercises. 330 $aCryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible. This unique and accessible textbook balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually ?does?, not a mathematical game about which one proves theorems. There is deep math; there are some theorems that must be proven; and there is a need to recognize the brilliant work done by those who focus on theory. But at the level of an undergraduate course, the emphasis should be first on knowing and understanding the algorithms and how to implement them, and also to be aware that the algorithms must be implemented carefully to avoid the ?easy? ways to break the cryptography. Hence, this text covers the algorithmic foundations and is complemented by core mathematics and arithmetic. Topics and features: Provides an exhaustive set of useful examples, to optimally convey thecryptographic computations Focuses on doing cryptography, rather than on proving theorems Includes detailed source code and a test suite Describes NTRU as a lattice-based cryptographic algorithm Addresses, among other topics, factoring attacks (including their history), elliptic curve cryptography, quantum cryptography, and homomorphic encryption This clearly written introductory textbook emphasizes how implementation issues affect algorithm decisions and will reinforce learning for computer science (or mathematics) students studying cryptography at the undergraduate level. In addition, it will be ideal for professional short courses or self-study. Duncan Buell, professor emeritus in the Dept. of Computer Science and Engineering at University of South Carolina, also has 15 years of experience at a research lab doing high-performance computing research in support of the U.S. National Security Agency. 410 0$aUndergraduate Topics in Computer Science,$x2197-1781 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science 606 $aData and Information Security 606 $aCryptology 606 $aTheory and Algorithms for Application Domains 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aTheory and Algorithms for Application Domains. 676 $a005.82 700 $aBuell$b Duncan A.$01082027 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485593303321 996 $aFundamentals of cryptography$92596969 997 $aUNINA