Bültmann & Gerriets
Algebra for Applications
Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression
von Arkadii Slinko
Verlag: Springer International Publishing
Reihe: Springer Undergraduate Mathematics Series
Hardcover
ISBN: 978-3-030-44073-2
Auflage: 2nd ed. 2020
Erschienen am 02.06.2020
Sprache: Englisch
Format: 235 mm [H] x 155 mm [B] x 21 mm [T]
Gewicht: 581 Gramm
Umfang: 384 Seiten

Preis: 37,44 €
keine Versandkosten (Inland)


Dieser Titel wird erst bei Bestellung gedruckt. Eintreffen bei uns daher ca. am 12. November.

Der Versand innerhalb der Stadt erfolgt in Regel am gleichen Tag.
Der Versand nach außerhalb dauert mit Post/DHL meistens 1-2 Tage.

37,44 €
merken
zum E-Book (PDF) 37,44 €
klimaneutral
Der Verlag produziert nach eigener Angabe noch nicht klimaneutral bzw. kompensiert die CO2-Emissionen aus der Produktion nicht. Daher übernehmen wir diese Kompensation durch finanzielle Förderung entsprechender Projekte. Mehr Details finden Sie in unserer Klimabilanz.
Biografische Anmerkung
Inhaltsverzeichnis
Klappentext

Arkadii M. Slinko is currently Professor of Mathematics at the University of Auckland, New Zealand. Before taking this position in 1993 he was a Senior Research Fellow of the interdisciplinary Institute of Systems Analysis of Russian Academy of Sciences in Moscow. He has published extensively in a wide range of journals in mathematics, computer science, economics, and politics. His current research focuses on the mathematics of social choice, game theory, and secret sharing.



1 Integers.- 2 Cryptology.- 3 Groups.- 4 Fields.- 5 Polynomials.- 6 Secret Sharing.- 7 Error-Correcting Codes.- 8 Compression.- Appendix A: GAP.- Appendix B: Miscellanea.- Solutions to Exercises.- Index.



Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression.
Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationallyhard problems and giving insights into how computational complexity can be used to protect the integrity of data.
The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.


andere Formate
weitere Titel der Reihe