0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Interactions between Group Theory, Symmetry and Cryptology (Hardcover): Maria Isabel Gonzalez Vasco Interactions between Group Theory, Symmetry and Cryptology (Hardcover)
Maria Isabel Gonzalez Vasco
R1,216 R1,073 Discovery Miles 10 730 Save R143 (12%) Ships in 18 - 22 working days
Group Theoretic Cryptography (Hardcover, New): Rainer Steinwandt, Maria Isabel Gonzalez Vasco Group Theoretic Cryptography (Hardcover, New)
Rainer Steinwandt, Maria Isabel Gonzalez Vasco
R3,496 Discovery Miles 34 960 Ships in 10 - 15 working days

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future. Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an undergraduate-level understanding of linear algebra and discrete mathematics, it details the specifics of using non-Abelian groups in the field of cryptography. Moreover, the book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES. The book starts with brief overviews of the fundamentals of group theory, complexity theory, and cryptography. Part two is devoted to public-key encryption, including provable security guarantees, public-key encryption in the standard model, and public-key encryption using infinite groups. The third part of the book covers secret-key encryption. It examines block ciphers, like the Advanced Encryption Standard, and cryptographic hash functions and message authentication codes. The last part delves into a number of cryptographic applications which are nowadays as relevant as encryption-identification protocols, key establishment, and signature schemes are covered. The book supplies formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory. Summaries and references for further reading, as well as exercises, are included at the end of each chapter. Selected solutions for exercises are provided in the back of the book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Souls of Black Folk - Essays and…
William Edward Burghardt Du Bois Paperback R502 Discovery Miles 5 020
The Iron Storm
Jack Du Brul Paperback R395 R353 Discovery Miles 3 530
Na 'n Plaas In Afrika
Irma Joubert Paperback R390 R366 Discovery Miles 3 660
Stream-Tube Method - A Complex-Fluid…
Jean-Robert Clermont, Amine Ammar Hardcover R4,965 Discovery Miles 49 650
Intermezzo
Sally Rooney Paperback R410 R366 Discovery Miles 3 660
A First Course in the Finite Element…
Daryl Logan Paperback R1,405 R1,305 Discovery Miles 13 050
Topological Theory of Graphs
Yanpei Liu Hardcover R4,705 Discovery Miles 47 050
Blood's Inner Rhyme - An…
Antjie Krog Paperback R370 R330 Discovery Miles 3 300
Bent Functions - Results and…
Natalia Tokareva Paperback R1,459 Discovery Miles 14 590
Letters To My Mother
Kumi Naidoo Paperback R300 R277 Discovery Miles 2 770

 

Partners