Buch, Englisch, 340 Seiten, Format (B × H): 159 mm x 241 mm, Gewicht: 616 g
Buch, Englisch, 340 Seiten, Format (B × H): 159 mm x 241 mm, Gewicht: 616 g
Reihe: Discrete Mathematics and Its Applications
ISBN: 978-1-4200-7946-3
Verlag: Chapman and Hall/CRC
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption.
Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik Mathematik Mathematik Allgemein Diskrete Mathematik, Kombinatorik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik Mathematik Algebra
- Mathematik | Informatik Mathematik Geometrie Algebraische Geometrie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Introduction to Algebraic Curves. Introduction to Error-Correcting Codes. Elliptic Curves and Their Applications to Cryptography. Secret Sharing Schemes. Authentication Codes. Frameproof Codes. Key Distribution Schemes. Broadcast Encryption and Multicast Security. Sequences. Bibliography. Index.