Cryptography Arithmetic Cryptography Arithmetic
Advances in Information Security

Cryptography Arithmetic

Algorithms and Hardware Architectures

    • US$84.99
    • US$84.99

출판사 설명

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level.
The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context.
This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.

장르
컴퓨터 및 인터넷
출시일
2020년
1월 30일
언어
EN
영어
길이
350
페이지
출판사
Springer International Publishing
판매자
Springer Nature B.V.
크기
10.7
MB
Arithmetic of Finite Fields Arithmetic of Finite Fields
2007년
Arithmetic of Finite Fields Arithmetic of Finite Fields
2008년
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2007년
Integer Algorithms In Cryptology And Information Assurance Integer Algorithms In Cryptology And Information Assurance
2014년
Computer Mathematics Computer Mathematics
2008년
Arithmetic of Finite Fields Arithmetic of Finite Fields
2023년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Network Security Policies and Procedures Network Security Policies and Procedures
2007년