undrgrnd Cliquez ici Baby KDP nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici nav_egg15_2 Cliquez ici Acheter Fire Acheter Kindle Paperwhite cliquez_ici Jeux Vidéo Gifts
EUR 43,20
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
An Introduction to Mathem... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

An Introduction to Mathematical Cryptography (Anglais) Broché – 19 octobre 2010

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 43,20
EUR 43,20 EUR 51,80

Idées cadeaux Livres Idées cadeaux Livres

Idées cadeaux Livres
Retrouvez toutes nos idées cadeaux dans notre Boutique Livres de Noël.

Offres spéciales et liens associés

Descriptions du produit

An Introduction to Mathematical Cryptography This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics. It includes exercises and examples at the end of each section. Full description

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 11 commentaires
22 internautes sur 23 ont trouvé ce commentaire utile 
Excellent 17 décembre 2009
Par Dr. Lee D. Carlson - Publié sur Amazon.com
Format: Relié Achat vérifié
At least for the chapters that were studied by this reviewer, the authors of this book give an effective introduction to the mathematical theory used in cryptography at a level that can be approached by an undergraduate senior in mathematics. The field of cryptography is vast of course, and a book of this size could not capture it effectively. The topics of primary importance are represented however, and the authors do a fine job of motivating and explaining the needed concepts.
The authors give an elementary overview of elliptic curves over the complex numbers, and most importantly over finite fields whose characteristic is greater than 3. The case where the characteristic is equal to 2 is delegated to its own section. In discussing the arithmetic of elliptic curves over finite fields, the authors give a good motivation for Hasse's formula, which gives a bound for the number of points of the elliptic curve (over a finite field), but they do not go into the details of the proof. The Hasse formula is viewed in some texts as a "Riemann Hypothesis" for elliptic curves over finite fields, and was proven by Hasse in 1934. This reviewer has not studied Hasse's proof, but a contemporary proof relies on the Frobenius map and its separability, two notions that the authors do not apparently want to introduce at this level of book (however they do introduce the Frobenius map when discussing elliptic curves over F2). Separability is viewed in some texts in elliptic curves as more of a technical issue, which can be ignored at an elementary level. It arises when studying endomorphisms of elliptic curves of fields of non-zero characteristic, and involves defining rational functions. The Frobenius map is not separable, and this fact allows one to show that its degree is strictly greater than the number of points in its kernel. Taking the nth power of the Frobenius map and adding to it the endomorphism which simply multiplies elements by -1, one can show that the number of points of the elliptic curve is equal to the degree of this endomorphism. Just a few more arithmetical calculations establishes Hasse's estimate.
Some more of the highlights of this part of the book:
- The reminder that the fastest known algorithm to solve the elliptic curve discrete logarithm problem takes p^1/2 steps for a finite field Fp (i.e. the algorithms therefore are not really better than "black box" algorithms).
- The brief historical discussion on public key cryptography.
- The motivational discussion for the Lenstra algorithm using simple calculations that leads to a failed attempt to find the reciprocal of an integer modulo p. This failure is used to explain the workings of the Lenstra elliptic curve factorization algorithm in a way that it is better appreciated by the reader.
- The discussion on the Frobenius map in the context of elliptic curves over F2 and its use in finding the number of points of an elliptic curve over a finite field.
- The motivational discussion for the use of distortion maps, due to the degeneracy of the Weil pairing. The distortion maps are used to define a modified Weyl pairing, which is proved to be non-degenerate.
Some omissions:
- Algorithms used to calculate the number of points of an elliptic curve over a finite field that are more efficient than brute-force counting or estimation using Hasse's formula.
- The proof that the torsion points of order m can be written as the product of two cyclic groups of order m. The authors apparently do not want to get into the notions of unramified and separable "isogenies" between elliptic curves and Galois extensions, both of which are used in the proof that they reference. Isogenies are mentioned in a footnote to the discussion on distortion maps, since the latter are isogenies.
- The proof verifying certain properties of divisors, namely that they are equal if the corresponding rational functions are constant multiples of each other, and that the degree of a divisor is zero if its sum is the zero element of the elliptic curve. The proofs were no doubt omitted due to their dependence on techniques from algebraic geometry.
- Quantum cryptography. This is discussed very briefly in the last chapter, but the subject is mature enough to be presented at the undergraduate level.
- Cryptography based on non-Abelian groups. One good example would be cryptography based on the mathematical theory of knots and braids (the braid group is non-Abelian), even though this approach is in its infancy at the present time, and in almost all cases shown to be highly vulnerable to attacks. It could have been included in the last chapter or possibly as a long exercise.
- Hyperelliptic curves are discussed very briefly in the last chapter, but a full-fledged presentation could be done in the book without missing the targeted audience. Hyperelliptic curves are also mentioned after the discussion of the MOV algorithm, wherein the authors allude to the use of Weil descent to transfer the elliptic curve discrete logarithm problem to a discrete logarithm problem in a finite field F2^m when m is composite. The authors correctly don't want to elaborate on Weil descent in any more detail, since it requires a solid knowledge of field extensions and theory of algebraic varieties at a level that one obtains in a graduate course in algebraic geometry. Suffice it to say that the strategy of Weil descent involves finding a cover of the elliptic curve by a hyperelliptic curve that is defined over the extension of the ground field. This approach has been shown to be problematic for Koblitz curves, the latter of which are discussed in the book.

Note: This review is based on a reading of chapters 5 and 8 of the book.
6 internautes sur 6 ont trouvé ce commentaire utile 
PERFECT 15 mars 2014
Par Stephen - Publié sur Amazon.com
Format: Relié Achat vérifié
I'm doing my honor's thesis on theoretical Cryptography as an undergrad at Colby College, and this book has been the perfect resource. It is so clear, and many time teaches by using easy to understand concrete examples. This book is the perfect place to start if you want to learn about Crypto.
13 internautes sur 16 ont trouvé ce commentaire utile 
Concepts explained well and plenty of examples to cement them 27 décembre 2009
Par Harry Mickalide - Publié sur Amazon.com
Format: Broché
This is a fantastic book. The writing is simple and clear. Even if I skipped class for a week, I could sit down and read this book, confident I would receive an explanation that was both complete and easy-to-follow. I couldn't recommend it more. Even though we didn't cover elliptic curves in my class, I read the chapter anyway and found that I was able to understand anything in the chapter that I committed to learning.
3 internautes sur 3 ont trouvé ce commentaire utile 
Essential book 14 février 2014
Par LUIS J DOMINGUEZ PEREZ - Publié sur Amazon.com
Format: Relié Achat vérifié
It is for undergrads, but useful at grad level to any student who didn't take the courses as an undergrad (i.e., fresh grad students discovering their love to cryptography)
1 internautes sur 1 ont trouvé ce commentaire utile 
Good, aside from Text Errors 23 août 2015
Par William C. Moffatt - Publié sur Amazon.com
Format: Broché Achat vérifié
Good start to this topic. The only hiccup was that I tried to work through the text example myself and came up with different answers. This is because the text was wrong. There is an extensive errata file that you can get online. May sure you get it before starting to work through text examples and end-of-chapter exercises. I hope that a revised version is issued that corrects these errata.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?