Cryptological Mathematics
Par :Formats :
Définitivement indisponible
Cet article ne peut plus être commandé sur notre site (ouvrage épuisé ou plus commercialisé). Il se peut néanmoins que l'éditeur imprime une nouvelle édition de cet ouvrage à l'avenir. Nous vous invitons donc à revenir périodiquement sur notre site.
- Nombre de pages199
- PrésentationBroché
- Poids0.39 kg
- Dimensions18,0 cm × 25,5 cm × 1,2 cm
- ISBN0-88385-719-7
- EAN9780883857199
- Date de parution01/01/2001
- ÉditeurMathematical Association Of Am
Résumé
Cryptological Mathematics introduces the reader to elementary yet rigorous mathematics from several different branches of the subject including number theory, abstract algebra, matrix algebra, probability, and statistics, all of which play a role in enciphering and deciphering secret messages. And it does so in a light-hearted fashion, thanks to the carryings-on of the book's three main characters, Beth, Stephanie and Molly. The book can be used at several different levels. Those interested in learning how to encipher messages using a variety of symmetric and asymmetric schemes will learn those techniques in this volume. Those interested in learning the mathematical foundations of these techniques will learn how and why the enciphering schemes actually work. And those who are looking for some challenging computer programming exercises will also find material in this book to keep them busy. So the book may be used profitably by amateur cryptographers, motivated liberal arts students, and mathematics or computer science majors alike. Whether readers are interested in cryptology, mathematics, or computer science, they will discover engaging and delightful material in this volume.
Cryptological Mathematics introduces the reader to elementary yet rigorous mathematics from several different branches of the subject including number theory, abstract algebra, matrix algebra, probability, and statistics, all of which play a role in enciphering and deciphering secret messages. And it does so in a light-hearted fashion, thanks to the carryings-on of the book's three main characters, Beth, Stephanie and Molly. The book can be used at several different levels. Those interested in learning how to encipher messages using a variety of symmetric and asymmetric schemes will learn those techniques in this volume. Those interested in learning the mathematical foundations of these techniques will learn how and why the enciphering schemes actually work. And those who are looking for some challenging computer programming exercises will also find material in this book to keep them busy. So the book may be used profitably by amateur cryptographers, motivated liberal arts students, and mathematics or computer science majors alike. Whether readers are interested in cryptology, mathematics, or computer science, they will discover engaging and delightful material in this volume.