| 000 | 02181nam a22003378i 4500 | ||
|---|---|---|---|
| 001 | CR9780511982170 | ||
| 003 | UkCbUP | ||
| 005 | 20200124160208.0 | ||
| 006 | m|||||o||d|||||||| | ||
| 007 | cr|||||||||||| | ||
| 008 | 101018s2018||||enk o ||1 0|eng|d | ||
| 020 | _a9780511982170 (ebook) | ||
| 020 | _z9780521817110 (hardback) | ||
| 020 | _z9780521520362 (paperback) | ||
| 040 |
_aUkCbUP _beng _erda _cUkCbUP |
||
| 050 | 4 |
_aQA76.9.A25 _bP45 2018 |
|
| 082 | 0 | 4 |
_a005.8/2 _223 |
| 100 | 1 |
_aPellikaan, R. _q(Ruud), _d1953- _eauthor. |
|
| 245 | 1 | 0 |
_aCodes, cryptology and curves with computer algebra / _cRuud Pellikaan [and three others]. |
| 264 | 1 |
_aCambridge : _bCambridge University Press, _c2018. |
|
| 300 |
_a1 online resource (xii, 597 pages) : _bdigital, PDF file(s). |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aTitle from publisher's bibliographic system (viewed on 10 Nov 2017). | ||
| 520 | _aThis well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics. | ||
| 650 | 0 | _aData encryption (Computer science) | |
| 650 | 0 | _aComputer security. | |
| 776 | 0 | 8 |
_iPrint version: _z9780521817110 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1017/9780511982170 |
| 999 |
_c515552 _d515550 |
||