0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,896)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Codes And Modular Forms: A Dictionary (Hardcover): Minjia Shi, Youngju Choie, Anuradha Sharma, Patrick Sole Codes And Modular Forms: A Dictionary (Hardcover)
Minjia Shi, Youngju Choie, Anuradha Sharma, Patrick Sole
R2,161 Discovery Miles 21 610 Ships in 18 - 22 working days

There are connections between invariant theory and modular forms since the times of Felix Klein, in the 19th century, connections between codes and lattices since the 1960's. The aim of the book is to explore the interplay between codes and modular forms. Here modular form is understood in a wide sense (Jacobi forms, Siegel forms, Hilbert forms). Codes comprises not only linear spaces over finite fields but modules over some commutative rings. The connection between codes over finite fields and lattices has been well documented since the 1970s. Due to an avalanche of results on codes over rings since the 1990's there is a need for an update at book level.

Digital Forensics and Watermarking - 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised... Digital Forensics and Watermarking - 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers (Paperback, 1st ed. 2023)
Xianfeng Zhao, Zhenjun Tang, Pedro Comesana-Alfaro, Alessandro Piva
R1,439 Discovery Miles 14 390 Ships in 9 - 17 working days

This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.

Algebraic and Stochastic Coding Theory (Hardcover): Dave K. Kythe, Prem K. Kythe Algebraic and Stochastic Coding Theory (Hardcover)
Dave K. Kythe, Prem K. Kythe
R4,959 Discovery Miles 49 590 Ships in 10 - 15 working days

Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes. It then examines codes based on the Galois field theory as well as their application in BCH and especially the Reed-Solomon codes that have been used for error correction of data transmissions in space missions. The major outlook in coding theory seems to be geared toward stochastic processes, and this book takes a bold step in this direction. As research focuses on error correction and recovery of erasures, the book discusses belief propagation and distributions. It examines the low-density parity-check and erasure codes that have opened up new approaches to improve wide-area network data transmission. It also describes modern codes, such as the Luby transform and Raptor codes, that are enabling new directions in high-speed transmission of very large data to multiple users. This robust, self-contained text fully explains coding problems, illustrating them with more than 200 examples. Combining theory and computational techniques, it will appeal not only to students but also to industry professionals, researchers, and academics in areas such as coding theory and signal and image processing.

Microelectronic Devices, Circuits and Systems - Third International Conference, ICMDCS 2022, Vellore, India, August 11-13,... Microelectronic Devices, Circuits and Systems - Third International Conference, ICMDCS 2022, Vellore, India, August 11-13, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
V. Arunachalam, K. Sivasankaran
R1,782 R1,679 Discovery Miles 16 790 Save R103 (6%) Ships in 9 - 17 working days

This book constitutes the proceedings of the Third International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS 2022, was held in Vellore, India, in August 2022. The 9 full papers and 5 short paper presented in this volume were carefully reviewed and selected from 84 submissions. The papers are organized in the following topical sections: System Level Design; Digital Design; Analog, Mixed-Signal and RF Design; and Emerging Technologies.

Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback): Adam Anderson, Tom Gilkeson Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback)
Adam Anderson, Tom Gilkeson
R340 R318 Discovery Miles 3 180 Save R22 (6%) Ships in 18 - 22 working days
Multi-Agent Systems - 19th European Conference, EUMAS 2022, Dusseldorf, Germany, September 14-16, 2022, Proceedings (Paperback,... Multi-Agent Systems - 19th European Conference, EUMAS 2022, Dusseldorf, Germany, September 14-16, 2022, Proceedings (Paperback, 1st ed. 2022)
Dorothea Baumeister, Joerg Rothe
R1,944 R1,827 Discovery Miles 18 270 Save R117 (6%) Ships in 9 - 17 working days

This book constitutes thoroughly refereed and revised selected papers from the proceedings of 19th European Conference on Multi-Agent Systems, EUMAS 2022, held in Dusseldorf, Germany, during September 14-16, 2022. The 23 full papers included in this book were carefully reviewed and selected from 36 submissions. The book also contains 6 short summaries of talks from PhD students at the PhD day. The papers deal with current topics in the research and development of multi-agent systems.

Encrypt, Sign, Attack - A compact introduction to cryptography (Paperback, 1st ed. 2022): Olaf Manz Encrypt, Sign, Attack - A compact introduction to cryptography (Paperback, 1st ed. 2022)
Olaf Manz
R777 Discovery Miles 7 770 Ships in 9 - 17 working days

This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.

Personal Satellite Services - International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers... Personal Satellite Services - International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Kandeepan Sithamparanathan, Mario Marchese
R1,801 R1,292 Discovery Miles 12 920 Save R509 (28%) Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009.

The 17 papers papers demonstrate recent advances in Internet applications over satellites, satellites technologies, and future satellite location-based systems.

Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback,... Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback, 1st ed. 2022)
Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
R1,951 R1,835 Discovery Miles 18 350 Save R116 (6%) Ships in 9 - 17 working days

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XV - International Workshop,... Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XV - International Workshop, COINE 2022, Virtual Event, May 9, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Nirav Ajmeri, Andreasa Morris Martin, Bastin Tony Roy Savarimuthu
R1,440 Discovery Miles 14 400 Ships in 9 - 17 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Coordination, Organizations, Institutions, and Norms for Governance of Multi-Agent Systems, COINE 2022, which was held in Auckland, New Zealand, on May 9, 2022. The 14 papers included in these proceedings were carefully reviewed and selected from 15 submissions. They deal with autonomous agents and multi-agent systems, focusing on the scientific and technological aspects of social coordination, organizational theory, artificial (electronic) institutions, and normative and ethical MAS.

Engineering Software for Modern Challenges - First International Conference, ESMoC 2021, Johor, Malaysia, October 20-21, 2021,... Engineering Software for Modern Challenges - First International Conference, ESMoC 2021, Johor, Malaysia, October 20-21, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Dayang Norhayati A. Jawawi, Imran Sarwar Bajwa, Rafaqut Kazmi
R1,434 Discovery Miles 14 340 Ships in 9 - 17 working days

This volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021. The 17 papers presented were thoroughly reviewed and selected from the 167 submissions. They are organized in the topical sections on software engineering; intelligent systems; software quality.

Multimedia Communications, Services and Security - 11th International Conference, MCSS 2022, Krakow, Poland, November 3-4,... Multimedia Communications, Services and Security - 11th International Conference, MCSS 2022, Krakow, Poland, November 3-4, 2022, Proceedings (Paperback, 1st ed. 2022)
Andrzej Dziech, Wim Mees, Marcin Niemiec
R1,643 R1,554 Discovery Miles 15 540 Save R89 (5%) Ships in 9 - 17 working days

This book constitutes the proceedings of the 11th International Conference, MCSS 2022, held in Krakow, Poland, during November 3-4, 2022. The 13 full papers included in this book were carefully reviewed and selected from 33 submissions. The papers cover ongoing research activities in the following topics: cybersecurity, multimedia services; intelligent monitoring; audio-visual systems; biometric applications; experiments and deployments.

Blockchain Technology and Applications (Hardcover): Pethuru Raj, Kavita Saini, Chellammal Surianarayanan Blockchain Technology and Applications (Hardcover)
Pethuru Raj, Kavita Saini, Chellammal Surianarayanan
R1,395 Discovery Miles 13 950 Ships in 4 - 6 working days

Blockchain is emerging as a powerful technology, which has attracted the wider attention of all businesses across the globe. In addition to financial businesses, IT companies and business organizations are keenly analyzing and adapting this technology for improving business processes. Security is the primary enterprise application. There are other crucial applications that include creating decentralized applications and smart contracts, which are being touted as the key differentiator of this pioneering technology. The power of any technology lies in its ecosystem. Product and tool vendors are building and releasing a variety of versatile and robust toolsets and platforms in order to speed up and simplify blockchain application development, deployment and management. There are other infrastructure-related advancements in order to streamline blockchain adoption. Cloud computing, big data analytics, machine and deep learning algorithm, and connected and embedded devices all are driving blockchain application development and deployment. Blockchain Technology and Applications illustrates how blockchain is being sustained through a host of platforms, programming languages, and enabling tools. It examines: Data confidential, integrity, and authentication Distributed consensus protocols and algorithms Blockchain systems design criteria and systems interoperability and scalability Integration with other technologies including cloud and big data It also details how blockchain is being blended with cloud computing, big data analytics and IoT across all industry verticals. The book gives readers insight into how this path-breaking technology can be a value addition in several business domains ranging from healthcare, financial services, government, supply chain and retail.

Astronomy in the Near-Infrared - Observing Strategies and Data Reduction Techniques (Hardcover, 1st ed. 2022): Jochen Heidt Astronomy in the Near-Infrared - Observing Strategies and Data Reduction Techniques (Hardcover, 1st ed. 2022)
Jochen Heidt
R3,559 R3,274 Discovery Miles 32 740 Save R285 (8%) Ships in 9 - 17 working days

Near-infrared astronomy has become one of the most rapidly developing branches in modern astrophysics. Innovative observing techniques, near-infrared detectors with quantum efficiencies in excess of 90%, highly specialised instruments as well as advanced data reduction techniques have allowed major breakthroughs in various areas like exoplanets, star-forming regions, the supermassive black hole in the Galactic center, and the high-redshift Universe. In this book, the reader will be introduced to the basic concepts of how to prepare near-infrared observations with maximized scientific return. Equal weight is given to all aspects of the data reduction for both - imaging and spectroscopy. Information is also provided on the state of the art instrumentation available and planned, on detector technology or the physics of the atmosphere, all of which influence the preparation and execution of observations and data reduction techniques. The beginner but also the expert will find a lot of information in compact form which is otherwise widely dispersed across the internet or other sources.

Selected Areas in Cryptography - 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected... Selected Areas in Cryptography - 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Riham Altawy, Andreas Hulsing
R1,950 R1,834 Discovery Miles 18 340 Save R116 (6%) Ships in 9 - 17 working days

This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.* The 23 full papers presented in this volume were carefully reviewed and selected from 60 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions. *The conference was originally planned to take place at the University of Victoria, BC, Canada. Due to the COVID-19 pandemic, it was held virtually.

Lattice Coding for Signals and Networks - A Structured Coding Approach to Quantization, Modulation and Multiuser Information... Lattice Coding for Signals and Networks - A Structured Coding Approach to Quantization, Modulation and Multiuser Information Theory (Hardcover)
Ram Zamir; Contributions by Bobak Nazer, Yuval Kochman; Illustrated by Ilai Bistritz
R4,505 Discovery Miles 45 050 Ships in 10 - 15 working days

Unifying information theory and digital communication through the language of lattice codes, this book provides a detailed overview for students, researchers and industry practitioners. It covers classical work by leading researchers in the field of lattice codes and complementary work on dithered quantization and infinite constellations, and then introduces the more recent results on 'algebraic binning' for side-information problems, and linear/lattice codes for networks. It shows how high dimensional lattice codes can close the gap to the optimal information theoretic solution, including the characterisation of error exponents. The solutions presented are based on lattice codes, and are therefore close to practical implementations, with many advanced setups and techniques, such as shaping, entropy-coding, side-information and multi-terminal systems. Moreover, some of the network setups shown demonstrate how lattice codes are potentially more efficient than traditional random-coding solutions, for instance when generalising the framework to Gaussian networks.

Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Lubeck, Germany, November 11-12,... Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Lubeck, Germany, November 11-12, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Vincent Grosso, Thomas Poeppelmann
R1,448 Discovery Miles 14 480 Ships in 9 - 17 working days

This book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lubeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic.The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations.

Information Theory and Coding by Example (Paperback, New): Mark Kelbert, Yuri Suhov Information Theory and Coding by Example (Paperback, New)
Mark Kelbert, Yuri Suhov
R1,492 Discovery Miles 14 920 Ships in 10 - 15 working days

This fundamental monograph introduces both the probabilistic and algebraic aspects of information theory and coding. It has evolved from the authors' years of experience teaching at the undergraduate level, including several Cambridge Maths Tripos courses. The book provides relevant background material, a wide range of worked examples and clear solutions to problems from real exam papers. It is a valuable teaching aid for undergraduate and graduate students, or for researchers and engineers who want to grasp the basic principles.

Codebreaker in the Far East (Paperback, New edition): Alan Stripp Codebreaker in the Far East (Paperback, New edition)
Alan Stripp
R805 Discovery Miles 8 050 Ships in 10 - 15 working days

Codebreaker in the Far East is the first book to describe how Bletchley Park and its Indian and Far Eastern outposts broke a series of Japanese codes and cipher systems of dazzling variety and complexity. Alan Stripp gives his first-hand account of the excitement of reading the enemy's mind, of working against the clock, hampered by one of the world's most daunting languages and the knowledge that they were facing an unyielding and resourceful enemy who had never known defeat.

New Foundations for Information Theory - Logical Entropy and Shannon Entropy (Paperback, 1st ed. 2021): David Ellerman New Foundations for Information Theory - Logical Entropy and Shannon Entropy (Paperback, 1st ed. 2021)
David Ellerman
R1,427 Discovery Miles 14 270 Ships in 9 - 17 working days

This monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications. Information is based on distinctions, differences, distinguishability, and diversity. Information sets are defined that express the distinctions made by a partition, e.g., the inverse-image of a random variable so they represent the pre-probability notion of information. Then logical entropy is a probability measure on the information sets, the probability that on two independent trials, a distinction or "dit" of the partition will be obtained. The formula for logical entropy is a new derivation of an old formula that goes back to the early twentieth century and has been re-derived many times in different contexts. As a probability measure, all the compound notions of joint, conditional, and mutual logical entropy are immediate. The Shannon entropy (which is not defined as a measure in the sense of measure theory) and its compound notions are then derived from a non-linear dit-to-bit transform that re-quantifies the distinctions of a random variable in terms of bits-so the Shannon entropy is the average number of binary distinctions or bits necessary to make all the distinctions of the random variable. And, using a linearization method, all the set concepts in this logical information theory naturally extend to vector spaces in general-and to Hilbert spaces in particular-for quantum logical information theory which provides the natural measure of the distinctions made in quantum measurement. Relatively short but dense in content, this work can be a reference to researchers and graduate students doing investigations in information theory, maximum entropy methods in physics, engineering, and statistics, and to all those with a special interest in a new approach to quantum information theory.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,199 Discovery Miles 31 990 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,970 Discovery Miles 29 700 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,723 Discovery Miles 27 230 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Fundamentals of Information Theory and Coding Design (Hardcover): Roberto Togneri, Christopher J. S. Desilva Fundamentals of Information Theory and Coding Design (Hardcover)
Roberto Togneri, Christopher J. S. Desilva
R3,956 Discovery Miles 39 560 Ships in 10 - 15 working days

Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students in mathematical abstraction. Even fewer build the essential theoretical framework when presenting algorithms and implementation details of modern coding systems.

Without abandoning the theoretical foundations, Fundamentals of Information Theory and Coding Design presents working algorithms and implementations that can be used to design and create real systems. The emphasis is on the underlying concepts governing information theory and the mathematical basis for modern coding systems, but the authors also provide the practical details of important codes like Reed-Solomon, BCH, and Turbo codes. Also setting this text apart are discussions on the cascading of information channels and the additivity of information, the details of arithmetic coding, and the connection between coding of extensions and Markov modelling.

Complete, balanced coverage, an outstanding format, and a wealth of examples and exercises make this an outstanding text for upper-level students in computer science, mathematics, and engineering and a valuable reference for telecommunications engineers and coding theory researchers.

A Comprehensive Course in Number Theory (Paperback, New): Alan Baker A Comprehensive Course in Number Theory (Paperback, New)
Alan Baker
R1,151 Discovery Miles 11 510 Ships in 10 - 15 working days

Developed from the author's popular text, A Concise Introduction to the Theory of Numbers, this book provides a comprehensive initiation to all the major branches of number theory. Beginning with the rudiments of the subject, the author proceeds to more advanced topics, including elements of cryptography and primality testing, an account of number fields in the classical vein including properties of their units, ideals and ideal classes, aspects of analytic number theory including studies of the Riemann zeta-function, the prime-number theorem and primes in arithmetical progressions, a description of the Hardy-Littlewood and sieve methods from respectively additive and multiplicative number theory and an exposition of the arithmetic of elliptic curves. The book includes many worked examples, exercises and further reading. Its wider coverage and versatility make this book suitable for courses extending from the elementary to beginning graduate studies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Readings from CRYPTOLOGIA on the Enigma…
Brian J. Winkel, Cipher Deavors, … Hardcover R2,798 Discovery Miles 27 980
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Fundamentals and Applications of…
Joceli Mayer, Paulo V.K. Borges, … Hardcover R2,012 R1,787 Discovery Miles 17 870
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610

 

Partners