Inside this Book
If you make use of this material, you may credit the authors as follows:
Zheng Zhiyong, "Modern Cryptography Volume 1", Springer Nature, 2022, DOI: 10.1007/978-981-19-0920-7, License: http://creativecommons.org/licenses/by/4.0/
This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical characteristics and computational complexity theory of public key cryptography, focusing on the three main algorithms of public key cryptography, RSA, discrete logarithm and elliptic curve cryptosystem. It aims to indicate what it is and why it is. It systematically simplifies and combs the theory and technology of lattice cryptography, which is the greatest feature of this book. It requires a good knowledge in algebra, number theory and probability statistics for readers to read this book. The senior students majoring in mathematics, compulsory for cryptography and science and engineering postgraduates will find this book helpful. It can also be used as the main reference book for researchers in cryptography and cryptographic engineering areas.
Modern Cryptography, Computational Complexity, Hamming Distance, Shannon Theorem, Source Coding Theorem, Optimal Code Theory, Statistical Characteristics Of Cryptosystem, Elliptic Curve Public Key Cryptosystem, Integer Lattice And Q-ary Lattice, Ntru Cryptosystem And Ajtai/dwork Cryptosystem
Rights | License
Except where otherwise noted, this item has been published under the following license:
If you believe that this publication infringes copyright, please contact us at firstname.lastname@example.org and provide relevant details so that we can investigate your claim.