0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Interactions between Group Theory, Symmetry and Cryptology (Hardcover): Maria Isabel Gonzalez Vasco Interactions between Group Theory, Symmetry and Cryptology (Hardcover)
Maria Isabel Gonzalez Vasco
R1,321 R1,159 Discovery Miles 11 590 Save R162 (12%) Ships in 10 - 15 working days
Group Theoretic Cryptography (Hardcover, New): Rainer Steinwandt, Maria Isabel Gonzalez Vasco Group Theoretic Cryptography (Hardcover, New)
Rainer Steinwandt, Maria Isabel Gonzalez Vasco
R3,413 Discovery Miles 34 130 Ships in 12 - 19 working days

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future. Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an undergraduate-level understanding of linear algebra and discrete mathematics, it details the specifics of using non-Abelian groups in the field of cryptography. Moreover, the book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES. The book starts with brief overviews of the fundamentals of group theory, complexity theory, and cryptography. Part two is devoted to public-key encryption, including provable security guarantees, public-key encryption in the standard model, and public-key encryption using infinite groups. The third part of the book covers secret-key encryption. It examines block ciphers, like the Advanced Encryption Standard, and cryptographic hash functions and message authentication codes. The last part delves into a number of cryptographic applications which are nowadays as relevant as encryption-identification protocols, key establishment, and signature schemes are covered. The book supplies formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory. Summaries and references for further reading, as well as exercises, are included at the end of each chapter. Selected solutions for exercises are provided in the back of the book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
UHU Contact Liquid Glue (30g)
R37 Discovery Miles 370
Maxwell & Williams Square Diamonds…
R2,149 R1,598 Discovery Miles 15 980
Cool Kids Oxford Analogue Watch (Black)
R192 Discovery Miles 1 920
Reebok Flex Ankle Weights (1.0kg)
R399 R290 Discovery Miles 2 900
Bantex @School 13cm Kids Blunt Nose…
R18 Discovery Miles 180
Mediabox NEO TV Stick (Black) - Netflix…
R1,204 Discovery Miles 12 040
Clint Eastwood: The Collection
William Holden, Kay Lenz, … Blu-ray disc  (1)
R817 Discovery Miles 8 170
Alfred Dunhill Custom Eau De Toilette…
 (1)
R2,188 R862 Discovery Miles 8 620
Scottish Dances Vol 4
Various Artists CD R515 Discovery Miles 5 150
Lyra Rembrandt Art Specials Pencil Set…
R716 R638 Discovery Miles 6 380

 

Partners