Modern Cryptography Volume 1 A Classical Introduction to Informational and Mathematical Principle

This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shan...

Full description

Bibliographic Details
Format: eBook
Language:English
Published: Singapore Springer Nature 2022
Series:Financial Mathematics and Fintech
Subjects:
Online Access:Open Access: DOAB: description of the publication
Open Access: DOAB, download the publication
LEADER 03129namaa2200541uu 4500
001 doab81672
003 oapen
005 20220514
006 m o d
007 cr|mn|---annan
008 220514s2022 xx |||||o ||| 0|eng d
020 |a 978-981-19-0920-7 
020 |a 9789811909207 
024 7 |a 10.1007/978-981-19-0920-7  |2 doi 
040 |a oapen  |c oapen 
041 0 |a eng 
042 |a dc 
072 7 |a KFF  |2 bicssc 
072 7 |a PBW  |2 bicssc 
072 7 |a UYA  |2 bicssc 
720 1 |a Zheng, Zhiyong  |4 aut 
245 0 0 |a Modern Cryptography Volume 1  |b A Classical Introduction to Informational and Mathematical Principle 
260 |a Singapore  |b Springer Nature  |c 2022 
300 |a 1 online resource (359 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Financial Mathematics and Fintech 
506 0 |a Open Access  |f Unrestricted online access  |2 star 
520 |a This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical characteristics and computational complexity theory of public key cryptography, focusing on the three main algorithms of public key cryptography, RSA, discrete logarithm and elliptic curve cryptosystem. It aims to indicate what it is and why it is. It systematically simplifies and combs the theory and technology of lattice cryptography, which is the greatest feature of this book. It requires a good knowledge in algebra, number theory and probability statistics for readers to read this book. The senior students majoring in mathematics, compulsory for cryptography and science and engineering postgraduates will find this book helpful. It can also be used as the main reference book for researchers in cryptography and cryptographic engineering areas. 
540 |a Creative Commons  |f by/4.0/  |2 cc  |u http://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Applied mathematics  |2 bicssc 
650 7 |a Finance and the finance industry  |2 bicssc 
650 7 |a Mathematical theory of computation  |2 bicssc 
653 |a Computational Complexity 
653 |a Elliptic Curve Public Key Cryptosystem 
653 |a Hamming Distance 
653 |a Integer Lattice and Q-ary Lattice 
653 |a Modern Cryptography 
653 |a NTRU Cryptosystem and Ajtai/Dwork Cryptosystem 
653 |a Optimal Code Theory 
653 |a Shannon Theorem 
653 |a Source Coding Theorem 
653 |a Statistical Characteristics of Cryptosystem 
793 0 |a DOAB Library. 
856 4 0 |u https://directory.doabooks.org/handle/20.500.12854/81672  |7 0  |z Open Access: DOAB: description of the publication 
856 4 0 |u https://library.oapen.org/bitstream/20.500.12657/54458/1/978-981-19-0920-7.pdf  |7 0  |z Open Access: DOAB, download the publication