Mathematics of Public Key Cryptography

Mathematics of Public Key Cryptography

Author: Steven D. Galbraith

Publisher: Cambridge University Press

Published: 2012-03-15

Total Pages: 631

ISBN-13: 1107013925

DOWNLOAD EBOOK

This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public key cryptography.


Algebraic Aspects of Cryptography

Algebraic Aspects of Cryptography

Author: Neal Koblitz

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 214

ISBN-13: 3662036428

DOWNLOAD EBOOK

From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. [...] Overall, this is an excellent expository text, and will be very useful to both the student and researcher." Mathematical Reviews


Mathematical Foundations of Public Key Cryptography

Mathematical Foundations of Public Key Cryptography

Author: Xiaoyun Wang

Publisher: CRC Press

Published: 2015-10-22

Total Pages: 228

ISBN-13: 1498702244

DOWNLOAD EBOOK

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography.R


Algebraic Geometry in Coding Theory and Cryptography

Algebraic Geometry in Coding Theory and Cryptography

Author: Harald Niederreiter

Publisher: Princeton University Press

Published: 2009-09-21

Total Pages: 272

ISBN-13: 140083130X

DOWNLOAD EBOOK

This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books


An Introduction to Mathematical Cryptography

An Introduction to Mathematical Cryptography

Author: Jeffrey Hoffstein

Publisher: Springer

Published: 2014-09-11

Total Pages: 549

ISBN-13: 1493917110

DOWNLOAD EBOOK

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie–Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.


Elliptic Curve Public Key Cryptosystems

Elliptic Curve Public Key Cryptosystems

Author: Alfred J. Menezes

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 139

ISBN-13: 1461531985

DOWNLOAD EBOOK

Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an up-to-date and self-contained treatment of elliptic curve-based public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject.


Multivariate Public Key Cryptosystems

Multivariate Public Key Cryptosystems

Author: Jintai Ding

Publisher: Springer Science & Business Media

Published: 2006-11-24

Total Pages: 271

ISBN-13: 0387369465

DOWNLOAD EBOOK

Multivariate public key cryptosystems (MPKC) is a fast-developing area in cryptography. This book systematically presents the subject matter for a broad audience and is the first book to focus on this exciting new topic. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find it a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students.


Algebraic Curves in Cryptography

Algebraic Curves in Cryptography

Author: San Ling

Publisher: CRC Press

Published: 2013-06-13

Total Pages: 340

ISBN-13: 1420079476

DOWNLOAD EBOOK

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sh


A Course in Mathematical Cryptography

A Course in Mathematical Cryptography

Author: Gilbert Baumslag

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2015-06-16

Total Pages: 476

ISBN-13: 311038616X

DOWNLOAD EBOOK

Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography


Introduction to Cryptography

Introduction to Cryptography

Author: Hans Delfs

Publisher: Springer Science & Business Media

Published: 2007-05-31

Total Pages: 372

ISBN-13: 3540492445

DOWNLOAD EBOOK

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.