Cryptography Arithmetic Cryptography Arithmetic
Advances in Information Security

Cryptography Arithmetic

Algorithms and Hardware Architectures

    • ‏84٫99 US$
    • ‏84٫99 US$

وصف الناشر

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level.
The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context.
This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٢٠
٣٠ يناير
اللغة
EN
الإنجليزية
عدد الصفحات
٣٥٠
الناشر
Springer International Publishing
البائع
Springer Nature B.V.
الحجم
١٠٫٧
‫م.ب.‬
Discovering Mathematics with Magma Discovering Mathematics with Magma
٢٠٠٧
Regression and the Moore-Penrose Pseudoinverse (Enhanced Edition) Regression and the Moore-Penrose Pseudoinverse (Enhanced Edition)
١٩٧٢
Condition Condition
٢٠١٣
Eigenvalue Problems: Algorithms, Software and Applications in Petascale Computing Eigenvalue Problems: Algorithms, Software and Applications in Petascale Computing
٢٠١٨
Complexity Theory and Cryptology Complexity Theory and Cryptology
٢٠٠٦
Foundations of Generic Optimization Foundations of Generic Optimization
٢٠٠٦
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
٢٠٢٠
Blockchain Cybersecurity, Trust and Privacy Blockchain Cybersecurity, Trust and Privacy
٢٠٢٠
Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
٢٠٢٠
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems Cross-Layer Design for Secure and Resilient Cyber-Physical Systems
٢٠٢٠
New Dimensions of Information Warfare New Dimensions of Information Warfare
٢٠٢٠
Ransomware Revolution: The Rise of a Prodigious Cyber Threat Ransomware Revolution: The Rise of a Prodigious Cyber Threat
٢٠٢١