Modern Cryptography Volume 1

Inside this Book

If you make use of this material, you may credit the authors as follows:

Zheng Zhiyong, "Modern Cryptography Volume 1", Springer Nature, 2022, DOI: 10.1007/978-981-19-0920-7, License: http://creativecommons.org/licenses/by/4.0/

This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical characteristics and computational complexity theory of public key cryptography, focusing on the three main algorithms of public key cryptography, RSA, discrete logarithm and elliptic curve cryptosystem. It aims to indicate what it is and why it is. It systematically simplifies and combs the theory and technology of lattice cryptography, which is the greatest feature of this book. It requires a good knowledge in algebra, number theory and probability statistics for readers to read this book. The senior students majoring in mathematics, compulsory for cryptography and science and engineering postgraduates will find this book helpful. It can also be used as the main reference book for researchers in cryptography and cryptographic engineering areas.

Keywords

Modern Cryptography, Computational Complexity, Hamming Distance, Shannon Theorem, Source Coding Theorem, Optimal Code Theory, Statistical Characteristics Of Cryptosystem, Elliptic Curve Public Key Cryptosystem, Integer Lattice And Q-ary Lattice, Ntru Cryptosystem And Ajtai/dwork Cryptosystem

Rights | License

Except where otherwise noted, this item has been published under the following license:

Takedown policy

If you believe that this publication infringes copyright, please contact us at info@jecasa-ltd.com and provide relevant details so that we can investigate your claim.