Esta edición ISBN ya no está disponible.Ver todas las copias de esta edición ISBN.
Book by Hoffstein Jeffrey Pipher Jill Silverman JH
"Sinopsis" puede pertenecer a otra edición de este libro.
From the reviews:
"The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information ... . The material is very well organized, and it is self-contained: no prerequisites in higher mathematics are needed. In fact, everything is explained and carefully covered ... . there is abundance of examples and proposed exercises at the end of each chapter. ... This book is ideal as a textbook for a course aimed at undergraduate mathematics or computer science students." (Fabio Mainardi, The Mathematical Association of America, October, 2008)
"This book focuses on public key cryptography ... . Hoffstein, Pipher, and Silverman ... provide a thorough treatment of the topics while keeping the material accessible. ... The book uses examples throughout the text to illustrate the theorems, and provides a large number of exercises ... . The volume includes a nice bibliography. ... Summing Up: Highly recommended. Upper-division undergraduate through professional collections." (C. Bauer, Choice, Vol. 46 (7), March, 2009)
"For most undergraduate students in mathematics or computer science (CS), mathematical cryptography is a challenging subject. ... it is written in a way that makes you want to keep reading. ... The authors officially targeted the book for advanced undergraduate or beginning graduate students. I believe that this audience is appropriate. ... it could even be used with students who are just learning how to execute rigorous mathematical proofs. ... I strongly believe that it finds the right tone for today’s students ... ." (Burkhard Englert, ACM Computing Reviews, March, 2009)
"The exercises and text would make an excellent course for undergraduate independent study. ... This is an excellent book. Hoffstein, Pipher and Silverman have written as good a book as is possible to explain public key cryptography. ... This book would probably be best suited for a graduate course that focused on public key cryptography, for undergraduate independent study, or for the mathematician who wants to see how mathematics is used in public key cryptography." (Jintai Ding and Chris Christensen, Mathematical Reviews, Issue 2009 m)Reseña del editor:
An Introduction to Mathematical Cryptography provides an introduction to public key cryptography and underlying mathematics that is required for the subject. Each of the eight chapters expands on a specific area of mathematical cryptography and provides an extensive list of exercises.
It is a suitable text for advanced students in pure and applied mathematics and computer science, or the book may be used as a self-study. This book also provides a self-contained treatment of mathematical cryptography for the reader with limited mathematical background.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Springer, 2008. Hardcover. Condición: New. Never used!. Nº de ref. del artículo: P110387779930
Descripción Springer, 2008. Hardcover. Condición: New. Brand New!. Nº de ref. del artículo: VIB0387779930
Descripción Springer, 2008. Hardcover. Condición: New. The pages of this book are bright, clean, and unmarked. There is no jacket as published and like shown. the boards are bright and clean with only minor shelf wear. A good clean solid copy. FAST SHIPPING & FREE TRACKING!. Nº de ref. del artículo: 138883
Descripción Springer, 2008. Hardcover. Condición: New. 2008. Nº de ref. del artículo: DADAX0387779930