LEADER 04134nam 22006135 450 001 996465351903316 005 20231016205833.0 010 $a3-030-34142-9 024 7 $a10.1007/978-3-030-34142-8 035 $a(CKB)4100000010121962 035 $a(DE-He213)978-3-030-34142-8 035 $a(MiAaPQ)EBC6033463 035 $a(PPN)242845398 035 $a(EXLCZ)994100000010121962 100 $a20200130d2020 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography Arithmetic$b[electronic resource] $eAlgorithms and Hardware Architectures /$fby Amos R. Omondi 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XIV, 336 p. 73 illus.) 225 1 $aAdvances in Information Security,$x1568-2633 ;$v77 311 $a3-030-34141-0 327 $a1 Basic Computer Arithmetic -- 2 Mathematical Fundamentals I: Number Theory -- 3 Modular-Arithmetic Cryptosystems -- 4 Modular Reduction -- 5 Modular Addition and Multiplication -- 6 Modular Exponentiation, Inversion, and Division -- 7 Mathematical Fundamentals II: Abstract Algebra -- 8 Elliptic-Curve Basics -- 9 Elliptic-Curve Cryptosystems -- 10 Polynomial-basis arithmetic -- 11 Normal-basis arithmetic -- A Mathematical Proofs -- Index. 330 $aModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics. 410 0$aAdvances in Information Security,$x1568-2633 ;$v77 606 $aData structures (Computer science) 606 $aData encryption (Computer science) 606 $aMicroprocessors 606 $aElectronic circuits 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aProcessor Architectures$3https://scigraph.springernature.com/ontologies/product-market-codes/I13014 606 $aCircuits and Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/T24068 615 0$aData structures (Computer science). 615 0$aData encryption (Computer science). 615 0$aMicroprocessors. 615 0$aElectronic circuits. 615 14$aData Structures and Information Theory. 615 24$aCryptology. 615 24$aProcessor Architectures. 615 24$aCircuits and Systems. 676 $a652.8 700 $aOmondi$b Amos R$4aut$4http://id.loc.gov/vocabulary/relators/aut$0770765 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465351903316 996 $aCryptography Arithmetic$91959955 997 $aUNISA