Cryptography Arithmetic
Algorithms and Hardware Architectures
Amos R. Omondi
PDF
ca. 96,29 €
Amazon
iTunes
Thalia.de
Weltbild.de
Hugendubel
Bücher.de
ebook.de
kobo
Osiander
Google Books
Barnes&Noble
bol.com
Legimi
yourbook.shop
Kulturkaufhaus
ebooks-center.de
* Affiliatelinks/Werbelinks
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Springer International Publishing
Naturwissenschaften, Medizin, Informatik, Technik / Informatik
Beschreibung
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level.
The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context.
This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.
Weitere Titel von diesem Autor
Weitere Titel in dieser Kategorie
Kundenbewertungen
Schlagwörter
polynomial basis, security, binary fields, computer arithmetic, hardware implementation, cryptosystems, decryption, normal basis, prime fields, inversion, computer architecture, hardware architecture, algorithms, cryptography, elliptic curves, finite fields, modular arithmetic