did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387779935

An Introduction to Mathematical Cryptography

by ; ;
  • ISBN13:

    9780387779935

  • ISBN10:

    0387779930

  • Format: Hardcover
  • Copyright: 2008-07-01
  • Publisher: Springer Verlag
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.95 Save up to $36.39
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

"This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic filter algebra is requited of the reader; techniques from algebra, number theory, and probability are introduced and developed as required." "This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online."--BOOK JACKET.

Author Biography

Dr. Jeffrey Hoffstein has been a professor at Brown University since 1989 and has been a  visiting professor and tenured professor at several other universities since 1978. His research areas are number theory, automorphic forms, and cryptography. He has authored more than 50 publications.Dr. Jill Pipher has been a professor at Brown Univesity since 1989. She has been an invited lecturer and has received numerous awards and honors. Her research areas are harmonic analysis, elliptic PDE, and cryptography. She has authored over 40 publications.Dr. Joseph Silverman has been a professor at Brown University 1988. He served as the Chair of the Brown Mathematics department from 2001-2004. He has received numerous fellowships, grants and awards and is a frequently invited lecturer. His research areas are number theory, arithmetic geometry, elliptic curves, dynamical systems and cryptography. He has authored more than120 publications and has had more than 20 doctoral students.

Table of Contents

Prefacep. v
Introductionp. xi
An Introduction to Cryptographyp. 1
Simple substitution ciphersp. 1
Divisibility and greatest common divisorsp. 10
Modular arithmeticp. 19
Prime numbers, unique factorization, and finite fieldsp. 26
Powers and primitive roots in finite fieldsp. 29
Cryptography before the computer agep. 34
Symmetric and asymmetric ciphersp. 36
Exercisesp. 47
Discrete Logarithms and Diffie-Hellmanp. 59
The birth of public key cryptographyp. 59
The discrete logarithm problemp. 62
Diffie-Hellman key exchangep. 65
The ElGamal public key cryptosystemp. 68
An overview of the theory of groupsp. 72
How hard is the discrete logarithm problem?p. 75
A collision algorithm for the DLPp. 79
The Chinese remainder theoremp. 81
The Pohlig-Hellman algorithmp. 86
Rings, quotients, polynomials, and finite fieldsp. 92
Exercisesp. 105
Integer Factorization and RSAp. 113
Euler's formula and roots modulo pqp. 113
The RSA public key cryptosystemp. 119
Implementation and security issuesp. 122
Primality testingp. 124
Pollard's p - 1 factorization algorithmp. 133
Factorization via difference of squaresp. 137
Smooth numbers and sievesp. 146
The index calculus and discrete logarithmsp. 162
Quadratic residues and quadratic reciprocityp. 165
Probabilistic encryptionp. 172
Exercisesp. 176
Combinatorics, Probability, and Information Theoryp. 189
Basic principles of countingp. 190
The Vigenere cipherp. 196
Probability theoryp. 210
Collision algorithms and meet-in-the-middle attacksp. 227
Pollard's [rho] methodp. 234
Information theoryp. 243
Complexity Theory and P versus NPp. 258
Exercisesp. 262
Elliptic Curves and Cryptographyp. 279
Elliptic curvesp. 279
Elliptic curves over finite fieldsp. 286
The elliptic curve discrete logarithm problemp. 290
Elliptic curve cryptographyp. 296
The evolution of public key cryptographyp. 301
Lenstra's elliptic curve factorization algorithmp. 303
Elliptic curves over F[subscript 2] and over F[subscript 2 superscript k]p. 308
Bilinear pairings on elliptic curvesp. 315
The Weil pairing over fields of prime power orderp. 325
Applications of the Weil pairingp. 334
Exercisesp. 339
Lattices and Cryptographyp. 349
A congruential public key cryptosystemp. 349
Subset-sum problems and knapsack cryptosystemsp. 352
A brief review of vector spacesp. 359
Lattices: Basic definitions and propertiesp. 363
Short vectors in latticesp. 370
Babai's algorithmp. 379
Cryptosystems based on hard lattice problemsp. 383
The GGH public key cryptosystemp. 384
Convolution polynomial ringsp. 387
The NTRU public key cryptosystemp. 392
NTRU as a lattice cryptosystemp. 400
Lattice reduction algorithmsp. 403
Applications of LLL to cryptanalysisp. 418
Exercisesp. 422
Digital Signaturesp. 437
What is a digital signature?p. 437
RSA digital signaturesp. 440
ElGamal digital signatures and DSAp. 442
GGH lattice-based digital signaturesp. 447
NTRU digital signaturesp. 450
Exercisesp. 458
Additional Topics in Cryptographyp. 465
Hash functionsp. 466
Random numbers and pseudorandom number generatorsp. 468
Zero-knowledge proofsp. 470
Secret sharing schemesp. 473
Identification schemesp. 474
Padding schemes and the random oracle modelp. 476
Building protocols from cryptographic primitivesp. 479
Hyperelliptic curve cryptographyp. 480
Quantum computingp. 483
Modern symmetric cryptosystems: DES and AESp. 485
List of Notationp. 489
Referencesp. 493
Indexp. 501
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program