Cargando…

Algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression

Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory a...

Descripción completa

Detalles Bibliográficos
Autor principal: Slinko, Arkadii
Lenguaje:eng
Publicado: Springer 2020
Materias:
Acceso en línea:https://dx.doi.org/10.1007/978-3-030-44074-9
http://cds.cern.ch/record/2720390
_version_ 1780965780925448192
author Slinko, Arkadii
author_facet Slinko, Arkadii
author_sort Slinko, Arkadii
collection CERN
description Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationally hard problems and giving insights into how computational complexity can be used to protect the integrity of data. The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.
id cern-2720390
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2020
publisher Springer
record_format invenio
spelling cern-27203902021-04-21T18:07:49Zdoi:10.1007/978-3-030-44074-9http://cds.cern.ch/record/2720390engSlinko, ArkadiiAlgebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compressionMathematical Physics and MathematicsModern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationally hard problems and giving insights into how computational complexity can be used to protect the integrity of data. The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.Springeroai:cds.cern.ch:27203902020
spellingShingle Mathematical Physics and Mathematics
Slinko, Arkadii
Algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression
title Algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression
title_full Algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression
title_fullStr Algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression
title_full_unstemmed Algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression
title_short Algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression
title_sort algebra for applications: cryptography, secret sharing, error-correcting, fingerprinting, compression
topic Mathematical Physics and Mathematics
url https://dx.doi.org/10.1007/978-3-030-44074-9
http://cds.cern.ch/record/2720390
work_keys_str_mv AT slinkoarkadii algebraforapplicationscryptographysecretsharingerrorcorrectingfingerprintingcompression