<p/><br></br><p><b> Book Synopsis </b></p></br></br>Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible.<br>This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually "does", not a mathematical game one proves theorems about. There is deep math; there are some theorems that must be proved; and there is a need to recognize the brilliant work done by those who focus on theory. But at the level of an undergraduate course, the emphasis should be first on knowing and understanding the algorithms and how to implement them, and also to be aware that the algorithms must be implemented carefully to avoid the "easy" ways to break the cryptography. This text covers the algorithmic foundations and is complemented by core mathematics and arithmetic.<p/><br></br><p><b> From the Back Cover </b></p></br></br><p>Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible.</p><p>This unique and accessible textbook balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually "does", not a mathematical game about which one proves theorems. There is deep math; there are some theorems that must be proven; and there is a need to recognize the brilliant work done by those who focus on theory. But at the level of an undergraduate course, the emphasis should be first on knowing and understanding the algorithms and how to implement them, and also to be aware that the algorithms must be implemented carefully to avoid the "easy" ways to break the cryptography. Hence, this text covers the algorithmic foundations and is complemented by core mathematics and arithmetic.</p><p><b>Topics and features: </b></p><p></p><ul><li>Provides an exhaustive set of useful examples, to optimally convey the cryptographic computations</li><li>Focuses on <i>doing</i> cryptography, rather than on proving theorems</li><li>Includes detailed source code and a test suite</li><li>Describes NTRU as a lattice-based cryptographic algorithm</li><li>Addresses, among other topics, factoring attacks (including their history), elliptic curve cryptography, quantum cryptography, and homomorphic encryption</li></ul><p></p><p>This clearly written introductory textbook emphasizes how implementation issues affect algorithm decisions and will reinforce learning for computer science (or mathematics) students studying cryptography at the undergraduate level. In addition, it will be ideal for professional short courses or self-study.</p><p><b>Duncan Buell</b>, professor emeritus in the Dept. of Computer Science and Engineering at University of South Carolina, also has 15 years of experience at a research lab doing high-performance computing research in support of the U.S. National Security Agency.</p><p></p><p/><br></br><p><b> About the Author </b></p></br></br><p>Duncan Buell, professor emeritus in the Dept. of Computer Science and Engineering at University of South Carolina, also has 15 years of experience at a research lab doing high-performance computing research in support of the US National Security Agency.</p>
Cheapest price in the interval: 49.99 on October 27, 2021
Most expensive price in the interval: 49.99 on November 8, 2021
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us