• Complain

Arkadii Slinko - Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)

Here you can read online Arkadii Slinko - Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Springer, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Arkadii Slinko Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)
  • Book:
    Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)
  • Author:
  • Publisher:
    Springer
  • Genre:
  • Year:
    2020
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression.

Designed for an undergraduate lecture course, this textbook provides all of the background in arithmetic, polynomials, groups, fields, and elliptic curves that is required to understand real-life applications such as cryptography, secret sharing, error-correcting, fingerprinting, and compression of information. It explains in detail how these applications really work. The book uses the free GAP computational package, allowing the reader to develop intuition about computationally hard problems and giving insights into how computational complexity can be used to protect the integrity of data.

The first undergraduate textbook to cover such a wide range of applications, including some recent developments, this second edition has been thoroughly revised with the addition of new topics and exercises. Based on a one semester lecture course given to third year undergraduates, it is primarily intended for use as a textbook, while numerous worked examples and solved exercises also make it suitable for self-study.

Arkadii Slinko: author's other books


Who wrote Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Springer Undergraduate Mathematics Series Advisory Editors M A J Chaplain - photo 1
Springer Undergraduate Mathematics Series
Advisory Editors
M. A. J. Chaplain
St. Andrews, UK
Angus Macintyre
Edinburgh, UK
Simon Scott
London, UK
Nicole Snashall
Leicester, UK
Endre Sli
Oxford, UK
Michael R. Tehranchi
Cambridge, UK
John F. Toland
Bath, UK

The Springer Undergraduate Mathematics Series (SUMS) is a series designed for undergraduates in mathematics and the sciences worldwide. From core foundational material to final year topics, SUMS books take a fresh and modern approach. Textual explanations are supported by a wealth of examples, problems and fully-worked solutions, with particular attention paid to universal areas of difficulty. These practical and concise texts are designed for a one- or two-semester course but the self-study approach makes them ideal for independent use.

More information about this series at http://www.springer.com/series/3423

Arkadii Slinko
Algebra for Applications
Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression
2nd ed. 2020
Arkadii Slinko Department of Mathematics The University of Auckland Auckland - photo 2
Arkadii Slinko
Department of Mathematics, The University of Auckland, Auckland, New Zealand
ISSN 1615-2085 e-ISSN 2197-4144
Springer Undergraduate Mathematics Series
ISBN 978-3-030-44073-2 e-ISBN 978-3-030-44074-9
https://doi.org/10.1007/978-3-030-44074-9
Mathematics Subject Classication (2010): 11A05 11A07 11T71 11Y05 11Y11 68P25 68P30
Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

To my parents Michael and Zinaida,

my wife Lilia,

my children Irina and Michael, and

my grandchildren Erik and Yuri.

Preface to the Second Edition

In our work, we are always between Scylla and Charybdis; we may fail to abstract enough, and miss important physics, or we may abstract too much and end up with fictitious objects in our models turning into real monsters that devour us.

MurrayGell-Mann (Nobel Prize in Physics in 1969)

My goals for this edition remain the same. I would like this book to be a basis for a one-semester undergraduate course in applied algebra. I want it to be mathematically rigorous and self-contained, and at the same time to provide a glimpse into the exciting world of applications. The challenge for such a course is to avoid getting overexcited about proving theorems and, on the other hand, not to get bogged down with technical details of the applications. This is a delicate balance, and it is up to the reader to decide how well I managed to steer the exposition between these Scylla and Charybdis.

Apart from correcting misprints and improving the order of exercises I added several small but significant sections that provide links between chapters and make the whole construction of the course more connected. The most notable additions are:

  • The chapter on secret sharing (Chap. ). By using secret sharing we show how a cryptosystem like RSA can be used by an organisation to share the decryption key between members of that organisation.

  • The chapter on polynomials (Chap..

  • The chapter on compression of information (Chap..

I also added a number of exercises. Since in the first edition of this book all exercises had solutions (and they still have), I decided to add new exercises (with a few exceptions) without solutions. Those without solutions are marked with a small circle. I also added an index to the book.

Enjoy the book!

Arkadii Slinko
Auckland, New Zealand
February 2020
Preface to the First Edition

The aim of a Lecturer should be, not to gratify his vanity by a shew of originality; but to explain, to arrange, and to digest with clearness, what is already known in the science

George Pryme (17811868)

This book originated from my lecture notes for the one-semester course which I have given many times in The University of Auckland since 1998. The goal of this book is to show the incredible power of algebra and number theory in the real world. It does not advance far in theoretical algebra, theoretical number theory or combinatorics. Instead, we concentrate on concrete objects like groups of points on elliptic curves, polynomial rings and finite fields, study their elementary properties and show their exceptional applicability to various problems in information handling. Among the applications are cryptography, secret sharing, error-correcting, fingerprinting and compression of information.

Some chapters of this bookand especially number-theoretic and cryptographic onesuse GAP for illustrations of the main ideas. GAP is a system for computational discrete algebra, which provides a programming language, a library of thousands of functions implementing algebraic algorithms, written in the GAP language, as well as large data libraries of algebraic objects.

If you are using this book for self-study, then, studying a certain topic, familiarise yourself with the corresponding section of Appendix A, where you will find detailed instructions how to use GAP for this particular topic. As GAP will be useful for most topics, it is not a good idea to skip it completely.

I owe a lot to Robin Christian who in 2006 helped me to introduce GAP to my course and proofread the lecture notes. The introduction of GAP has been the biggest single improvement to this course. The initial version of the GAP notes, which have now been developed into Appendix A, was written by Robin. Stefan Kohl, with the assistance of Eamonn OBrien, kindly provided us with two programs for GAP that allowed us to calculate in groups of points on elliptic curves. I am grateful to Paul Hafner, Primo Potonic, Jamie Sneddon and especially to Steven Galbraith who in various years were members of the teaching team for this course and suggested valuable improvements or contributed exercises.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)»

Look at similar books to Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series)»

Discussion, reviews of the book Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression (Springer Undergraduate Mathematics Series) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.