Book by Myasnikov Alexei Shpilrain Vladimir Ushakov Alexan
"Sinopsis" puede pertenecer a otra edición de este libro.
From the reviews:
“The book at hand has the aim to introduce the reader into the rich world of group-based asymmetric encryption. ... The basics necessary for the understanding are given in introducing chapters. Many hints for further reading are given. So, the book might be useful for the beginner, who wants to get a clear introduction, as well as for the expert, who gets an elaborate survey as well as much stimulation for proceeding research.” (Michael Wüstner, Zentralblatt MATH, Vol. 1248, 2012)
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown that there is a remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. Then, complexity theory, notably generic-case complexity of algorithms, is employed for cryptanalysis of various cryptographic protocols based on infinite groups, and the ideas and machinery from the theory of generic-case complexity are used to study asymptotically dominant properties of some infinite groups that have been applied in public key cryptography so far. Its elementary exposition makes the book accessible to graduate as well as undergraduate students in mathematics or computer science.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 17,80 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 10,47 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoLibrería: Majestic Books, Hounslow, Reino Unido
Condición: New. pp. 204 Illus. Nº de ref. del artículo: 7535145
Cantidad disponible: 4 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. pp. 204. Nº de ref. del artículo: 26345590
Cantidad disponible: 4 disponibles
Librería: Romtrade Corp., STERLING HEIGHTS, MI, Estados Unidos de America
Condición: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Nº de ref. del artículo: ABNR-72079
Cantidad disponible: 5 disponibles
Librería: Biblios, Frankfurt am main, HESSE, Alemania
Condición: New. pp. 204. Nº de ref. del artículo: 18345596
Cantidad disponible: 4 disponibles
Librería: UK BOOKS STORE, London, LONDO, Reino Unido
Condición: Brand New. Brand New! Fast Delivery This is an International Edition and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 7-12 days and we do have flat rate for up to 2LB. Extra shipping charges will be requested if the Book weight is more than 5 LB. This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability. Nº de ref. del artículo: CBS 9783764388263
Cantidad disponible: Más de 20 disponibles
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown that there is a remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory.Then, complexity theory, notably generic-case complexity of algorithms, is employed for cryptanalysis of various cryptographic protocols based on infinite groups, and the ideas and machinery from the theory of generic-case complexity are used to study asymptotically dominant properties of some infinite groups that have been applied in public key cryptography so far. Its elementary exposition makes the book accessible to graduate as well as undergraduate students in mathematics or computer science. 183 pp. Englisch. Nº de ref. del artículo: 9783764388263
Cantidad disponible: 2 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9783764388263_new
Cantidad disponible: Más de 20 disponibles
Librería: XLANCEBOOKS Store, CASPER, WY, Estados Unidos de America
Condición: NEW. Brand New! . "This is an International Edition." Book is In New condition and ship within One Working Day Tracking Number Provided by Customer 12-24 In To Hour, Deliver by FedEx & Aramex, UPS, & USPS Act. Order can be delivered worldwide With In 8-12 Working day Delivery. Ship from India & United States. Nº de ref. del artículo: CBSBOOKS859
Cantidad disponible: Más de 20 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown that there is a remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory.Then, complexity theory, notably generic-case complexity of algorithms, is employed for cryptanalysis of various cryptographic protocols based on infinite groups, and the ideas and machinery from the theory of generic-case complexity are used to study asymptotically dominant properties of some infinite groups that have been applied in public key cryptography so far. Its elementary exposition makes the book accessible to graduate as well as undergraduate students in mathematics or computer science. Nº de ref. del artículo: 9783764388263
Cantidad disponible: 1 disponibles
Librería: moluna, Greven, Alemania
Kartoniert / Broschiert. Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Increased interest in applications of combinatorial group theory to cryptographyFirst monograph exploring the area of non-commutative cryptography Employing decision problems (as opposed to search problems) in public key cryptography allow. Nº de ref. del artículo: 5279957
Cantidad disponible: Más de 20 disponibles