Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
This is a central topic in any computer science curriculum. To distinguish this textbook from others, the author considers probabilistic methods as being fundamental for the construction of simple and efficient algorithms, and in each chapter at least one problem is solved using a randomized algorithm. Data structures are discussed to the extent needed for the implementation of the algorithms. The specific algorithms examined were chosen because of their wide field of application. This book originates from lectures for undergraduate and graduate students. The text assumes experience in programming algorithms, especially with elementary data structures such as chained lists, queues, and stacks. It also assumes familiarity with mathematical methods, although the author summarizes some basic notations and results from probability theory and related mathematical terminology in the appendices. He includes many examples to explain the individual steps of the algorithms, and he concludes each chapter with numerous exercises.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.
This is a central topic in any computer science curriculum. To distinguish this textbook from others, the author considers probabilistic methods as being fundamental for the construction of simple and efficient algorithms, and in each chapter at least one problem is solved using a randomized algorithm. Data structures are discussed to the extent needed for the implementation of the algorithms. The specific algorithms examined were chosen because of their wide field of application. This book originates from lectures for undergraduate and graduate students. The text assumes experience in programming algorithms, especially with elementary data structures such as chained lists, queues, and stacks. It also assumes familiarity with mathematical methods, although the author summarizes some basic notations and results from probability theory and related mathematical terminology in the appendices. He includes many examples to explain the individual steps of the algorithms, and he concludes each chapter with numerous exercises.
Lernen Sie in diesem Buch mehr uber Algorithmen und Datenstrukturen In diesem Lehrbuch werden Algorithmen und Datenstrukturen exakt aber auch anschaulich und nachvollziehbar vermittelt, denn Algorithmen sind heute allgegenwartig und vielfaltig. Sie sind Gegenstand intensiver Forschung und zahlen zu den fundamentalen Konzepten der Informatik. Dieses Buch uber Algorithmen und Datenstrukturen ist aus Vorlesungen fur Studierende der Informatik sowie der Medien- und Wirtschaftsinformatik an der Technischen Hochschule Nurnberg entstanden. Die grundlegenden Themen werden in den Bachelorkursen behandelt. Fortgeschrittene Teile, wie zum Beispiel die probabilistischen Algorithmen, stammen dagegen aus Masterkursen. Der Inhalt des Werks im UEberblick Im ersten Kapitel seines Buchs uber Algorithmen und Datenstrukturen fuhrt Knebl relevante Grundlagen und Designprinzipien fur Algorithmen ein. Die anschliessenden Kapitel 2 - 6 sind nach Problembereichen organisiert: Sortieren und Suchen (2), Hashverfahren (3), Baume zur Speicherung von Daten und zur Datenkomprimierung (4), fundamentale Graphenalgorithmen, wie Tiefen- und Breitensuche und Anwendungen davon (5), die Berechnung von minimalen aufspannenden Baumen und von kurzesten Wegen in gewichteten Graphen als auch die Loesung des Flussproblems in Netzwerken (6). Probabilistische Methoden sind grundlegend fur einfache sowie effiziente Algorithmen und Datenstrukturen. Deshalb wird in jedem Kapitel dieses Buchs mindestens ein Problem mit einem probabilistischen Algorithmus geloest. Die notwendigen mathematischen Grundlagen werden im ersten Kapitel sowie im Anhang entwickelt. Loesungen zu den zahlreichen UEbungsaufgaben stehen Ihnen bequem zum Download bereit.
|
You may like...
|