logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Algebra For Applications Cryptography Secret Sharing Errorcorrecting Fingerprinting Compression 2nd Edition Arkadii Slinko

  • SKU: BELL-50458098
Algebra For Applications Cryptography Secret Sharing Errorcorrecting Fingerprinting Compression 2nd Edition Arkadii Slinko
$ 31.00 $ 45.00 (-31%)

5.0

60 reviews

Algebra For Applications Cryptography Secret Sharing Errorcorrecting Fingerprinting Compression 2nd Edition Arkadii Slinko instant download after payment.

Publisher: Springer, Springer Nature Switzerland AG
File Extension: PDF
File size: 4.04 MB
Pages: 376
Author: Arkadii Slinko
ISBN: 9783030440732, 9783030440749, 3030440737, 3030440745
Language: English
Year: 2020
Edition: 2

Product desciption

Algebra For Applications Cryptography Secret Sharing Errorcorrecting Fingerprinting Compression 2nd Edition Arkadii Slinko by Arkadii Slinko 9783030440732, 9783030440749, 3030440737, 3030440745 instant download after payment.

Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationally hard problems and giving insights into how computational complexity can be used to protect the integrity of data.

The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.

Related Products