The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption.
Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption.
Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"9433","item_name":"An Introduction to Mathematical Cryptography - Undergraduate Texts in Mathematics","item_brand":"Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman","item_category":"Science, Technology & Medicine","list":"Product Page","price":"35.37","variant":"","quantity":1},{"item_id":"16192","item_name":"Psycho-Cybernetics (Updated and Expanded) - Psycho-cybernetics","item_brand":"Gift Card","item_category":"Health & Lifestyle","list":"Product Page","price":"8.39","variant":"","quantity":1},{"item_id":"17963","item_name":"Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 1922, 2020, Proceedings, Part I - Security and Cryptology 12146","item_brand":"Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi","item_category":"Computing & Internet","list":"Product Page","price":"38.85","variant":"","quantity":1},{"item_id":"1748","item_name":"The Black Swan: The Impact of the Highly Improbable","item_brand":"Nassim Nicholas Taleb","item_category":"Language & Reference","list":"Product Page","price":"0.95","variant":"","quantity":1},{"item_id":"2924","item_name":"Nexus: A Brief History of Information Networks from the Stone Age to AI","item_brand":"Yuval Noah Harari","item_category":"History","list":"Product Page","price":"7.69","variant":"","quantity":1},{"item_id":"7139","item_name":"The Unaccountability Machine: Why Big Systems Make Terrible Decisions","item_brand":"Dan Davies","item_category":"Language & Reference","list":"Product Page","price":"6.08","variant":"","quantity":1},{"item_id":"8470","item_name":"Understanding Cryptography: A Textbook for Students and Practitioners","item_brand":"Christof Paar, Bart Preneel, Jan Pelzl","item_category":"Computing & Internet","list":"Product Page","price":"22.96","variant":"","quantity":1},{"item_id":"11037","item_name":"Introduction to Cryptography: Principles and Applications - Information Security and Cryptography","item_brand":"Hans Delfs, Helmut Knebl","item_category":"Computing & Internet","list":"Product Page","price":"31.49","variant":"","quantity":1}]