Algebraic Aspects of Cryptography

  • Neal┬áKoblitz

Part of the Algorithms and Computation in Mathematics book series (AACIM, volume 3)

Table of contents

  1. Front Matter
    Pages I-IX
  2. Neal Koblitz
    Pages 1-17
  3. Neal Koblitz
    Pages 18-52
  4. Neal Koblitz
    Pages 53-79
  5. Neal Koblitz
    Pages 80-102
  6. Neal Koblitz
    Pages 103-116
  7. Neal Koblitz
    Pages 117-154
  8. Back Matter
    Pages 155-206

About this book

Introduction

This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.

 

From the reviews:

"... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher."

M.V.D.Burmester, Mathematical Reviews 2002

"... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory."

P. Hajnal, Acta Scientiarum Mathematicarum 64.1998

"... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication."

E.Leiss, Computing Reviews 1998

Keywords

Algebra DES Digital Signature Algorithm algebraic methods algorithms complexity computational number theory cryptography data security elliptic and hyperelliptic curves finite field linear algebra number theory

Authors and affiliations

  • Neal┬áKoblitz
    • 1
  1. 1.Department of MathematicsUniversity of WashingtonSeattleUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-03642-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-642-08332-7
  • Online ISBN 978-3-662-03642-6
  • Series Print ISSN 1431-1550
  • About this book
Industry Sectors
Electronics
Telecommunications
Biotechnology