Normal view MARC view ISBD view

Algebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression

By: Slinko, Arkadii.
Series: Springer undergraduate mathematics series, 1615-2085.Publisher: Switzerland : Springer, 2020Edition: 2nd ed.Description: xiv, 368 p. ; ill., 24 cm.ISBN: 9783030440732.Subject(s): AlgebraDDC classification: 512.9 Summary: This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory. This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references and index.

This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory. This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha