000 | 01581nam a22002177a 4500 | ||
---|---|---|---|
005 | 20240219160707.0 | ||
008 | 240219b |||||||| |||| 00| 0 eng d | ||
020 | _a9783030734916 | ||
082 |
_a005.824 _bBUE |
||
100 |
_aBuell, Duncan _914396 |
||
245 |
_aFundamentals of cryptography: _bintroducing mathematical and algorithmic foundations |
||
260 |
_bSpringer _aSwitzerland _c2021 |
||
300 | _axv, 278 p. | ||
365 |
_aEURO _b42.00 |
||
490 | _aUndergraduate Topics in Computer Science (UTICS) | ||
520 | _aCryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible. This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually “does”, not a mathematical game one proves theorems about. There is deep math; there are some theorems that must be proved; and there is a need to recognize the brilliant work done by those who focus on theory. But at the level of an undergraduate course, the emphasis should be first on knowing and understanding the algorithms and how to implement them, and also to be aware that the algorithms must be implemented carefully to avoid the “easy” ways to break the cryptography. This text covers the algorithmic foundations and is complemented by core mathematics and arithmetic. (https://link.springer.com/book/10.1007/978-3-030-73492-3#about-this-book) | ||
650 |
_aCryptography _916113 |
||
650 |
_aMathematics _915517 |
||
650 |
_aComputer security _915178 |
||
942 |
_cBK _2ddc |
||
999 |
_c6143 _d6143 |