• Contact

  • Newsletter

  • About us

  • Delivery options

  • News

  • 0
    Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression

    Algebra for Applications by Slinko, Arkadii;

    Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression

    Series: Springer Undergraduate Mathematics Series;

      • GET 8% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 58.84
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        24 959 Ft (23 771 Ft + 5% VAT)
      • Discount 8% (cc. 1 997 Ft off)
      • Discounted price 22 963 Ft (21 869 Ft + 5% VAT)

    24 959 Ft

    db

    Availability

    Not yet published.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number Third Edition 2025
    • Publisher Springer
    • Date of Publication 31 May 2025
    • Number of Volumes 1 pieces, Book

    • ISBN 9783031826252
    • Binding Paperback
    • No. of pages395 pages
    • Size 235x155 mm
    • Language English
    • Illustrations 8 Illustrations, black & white; 2 Illustrations, color
    • 700

    Categories

    Short description:

    This textbook provides mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Modern societies are awash with data that needs to be manipulated in many ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorized access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory. This textbook covers background topics in arithmetic, polynomials, groups, fields, and elliptic curves required for real-life applications like cryptography, secret sharing, error-correcting, fingerprinting, and compression of information.



     



    The book illustrates the work of these applications using the free GAP computational package. It uses this package to help readers understand computationally hard problems and provide insights into protecting data integrity. This textbook covers a wide range of applications including recent developments, primarily intended for use as a textbook, with numerous worked examples and solved exercises suitable for self-study.



     



    This edition has been thoroughly revised with new topics and exercises, introducing hash functions for properly describing digital signatures, blockchains, and digital currencies in the latest version.

    More

    Long description:

    This textbook provides mathematical tools and applies them to study key aspects of data transmission such as encryption and compression. Modern societies are awash with data that needs to be manipulated in many ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorized access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory. This textbook covers background topics in arithmetic, polynomials, groups, fields, and elliptic curves required for real-life applications like cryptography, secret sharing, error-correcting, fingerprinting, and compression of information.



     



    The book illustrates the work of these applications using the free GAP computational package. It uses this package to help readers understand computationally hard problems and provide insights into protecting data integrity. This textbook covers a wide range of applications including recent developments, primarily intended for use as a textbook, with numerous worked examples and solved exercises suitable for self-study.



     



    This edition has been thoroughly revised with new topics and exercises, introducing hash functions for properly describing digital signatures, blockchains, and digital currencies in the latest version.

    More

    Table of Contents:

    Integers.- Cryptology.- Groups.- Fields.- Polynomials.- Secret Sharing.- Error-Correcting Codes.- Compression.- Appendix A: GAP.- Appendix B: Miscellanea.- Solutions to Exercises.- Index.

    More