|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Jeffrey Hoffstein , Jill Pipher , Joseph H. SilvermanPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2nd ed. 2014 Dimensions: Width: 15.50cm , Height: 3.00cm , Length: 23.50cm Weight: 9.516kg ISBN: 9781493917105ISBN 10: 1493917102 Pages: 538 Publication Date: 11 September 2014 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsFrom the book reviews: This is a text for an upper undergraduate/lower graduate course in mathematical cryptography. It is very well written and quite clear. Topics are well-motivated, and there are a good number of examples and nicely chosen exercises. An instructor of a fairly sophisticated undergraduate course in cryptography who wants to emphasize public key cryptography should definitely take a look at this book. (Mark Hunacek, MAA Reviews, October, 2014) This book explains the mathematical foundations of public key cryptography in a mathematically correct and thorough way without omitting important practicalities. ... I would like to emphasize that the book is very well written and quite clear. Topics are well motivated, and there are a good number of examples and nicely chosen exercises. To me, this book is still the first-choice introduction to public-key cryptography. (Klaus Galensa, Computing Reviews, March, 2015) This is a text for an upper undergraduate/lower graduate course in mathematical cryptography. ... It is very well written and quite clear. Topics are well-motivated, and there are a good number of examples and nicely chosen exercises. ... An instructor of a fairly sophisticated undergraduate course in cryptography who wants to emphasize public key cryptography should definitely take a look at this book. (Mark Hunacek, MAA Reviews, October, 2014) “This book explains the mathematical foundations of public key cryptography in a mathematically correct and thorough way without omitting important practicalities. … I would like to emphasize that the book is very well written and quite clear. Topics are well motivated, and there are a good number of examples and nicely chosen exercises. To me, this book is still the first-choice introduction to public-key cryptography.” (Klaus Galensa, Computing Reviews, March, 2015) “This is a text for an upper undergraduate/lower graduate course in mathematical cryptography. … It is very well written and quite clear. Topics are well-motivated, and there are a good number of examples and nicely chosen exercises. … An instructor of a fairly sophisticated undergraduate course in cryptography who wants to emphasize public key cryptography should definitely take a look at this book.” (Mark Hunacek, MAA Reviews, October, 2014) Author InformationDr. Jeffrey Hoffstein has been a professor at Brown University since 1989 and has been a visiting professor and tenured professor at several other universities since 1978. His research areas are number theory, automorphic forms and cryptography. He has authored more than 50 publications. Dr. Jill Pipher has been a professor at Brown University since 1989. She has been an invited lecturer and has received numerous awards and honors. Her research areas are harmonic analysis, elliptic PDE, and cryptography. She has authored over 40 publications. Dr. Joseph Silverman has been a professor at Brown University since 1988. He served as the Chair of the Brown Mathematics department from 2001–2004. He has received numerous fellowships, grants and awards and is a frequently invited lecturer. His research areas are number theory, arithmetic geometry, elliptic curves, dynamical systems and cryptography. He has authored more than 130 publications and has had more than 20 doctoral students. Tab Content 6Author Website:Countries AvailableAll regions |