
- 534 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Practical Mathematical Cryptography
About this book
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography. Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography.
Cryptography is also a practical science, and the book shows how modern cryptography solves important practical problems in the real world, developing the theory and practice of cryptography from the basics to secure messaging and voting.
The presentation provides a unified and consistent treatment of the most important cryptographic topics, from the initial design and analysis of basic cryptographic schemes towards applications.
Features
-
- Builds from theory toward practical applications
- Suitable as the main text for a mathematical cryptography course
- Focus on secure messaging and voting systems.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half-Title Page
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 ■ Symmetric Cryptography
- Chapter 2 ■ Key Exchange and Diffie-Hellman
- Chapter 3 ■ Public Key Encryption
- Chapter 4 ■ Digital Signatures
- Chapter 5 ■ Factoring Using Quantum Computers
- Chapter 6 ■ Computational Problems
- Chapter 7 ■ Symmetric Cryptography
- Chapter 8 ■ Public Key Encryption
- Chapter 9 ■ Digital Signatures
- Chapter 10 ■ Key Exchange
- Chapter 11 ■ Arguments
- Chapter 12 ■ Multi-party Computation
- Chapter 13 ■ Messaging Protocols
- Chapter 14 ■ Cryptographic Voting
- Index