Semirings as Building Blocks in Cryptography 🔍
Mariana Durcheva, Author Cambridge Scholars Publishing, 1, 2020
英语 [en] · PDF · 5.4MB · 2020 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
Semirings As An Algebraic Structure Have Been Known Since 1934, But Remained Unapplied For Mathematical Purposes For A Long Time. It Has Only Been In The Past Decade That They Have Been Used In Cryptography. The Advantage Of (additively) Idempotent Semirings Is That The Additive Operation Does Not Have An Inverse, Which Can Help In Preventing The Breakage Of A Cryptosystem. This Book Describes A Number Of Cryptographic Protocols, As Well As The Hard Mathematical Problems On Which Their Security Is Based. It Will Appeal To Cryptographers And Specialists In Applied Algebra.
备用文件名
lgrsnf/Semirings As Building.pdf
备用文件名
zlib/Computers/Cryptography/Mariana Durcheva/Semirings as Building Blocks in Cryptography_5524834.pdf
备选作者
Durcheva M
备用版本
Cambridge Scholars Publishing, Newcastle-upon-Tyne, 1920
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Newcastle upon Tyne, 2020
元数据中的注释
lg2525394
元数据中的注释
{"edition":"1","isbns":["1527541703","9781527541702"],"last_page":131,"publisher":"Cambridge Scholars Publishing"}
备用描述
Contents
Acknowledgements
Preface
Chapter One
Chapter Two
2.1 Discrete Logarithms in Finite Fields
2.1.1 Definitions
2.1.2 Public key Cryptosystems based on the Discrete Logarithm Problem
2.1.3 Generic algorithms for solving the Discrete Logarithm Problem
2.1.4 Index Calculus algorithms for finite fields
2.2 Group Based Cryptography
2.2.1 The Discrete Logarithm Problem in abelian groups
2.2.2 The Discrete Logarithm Problem in nonabelian groups
2.2.3 Groups used as platforms for cryptosystems
2.3 The Discrete Logarithm Problem in Rings and Semirings
2.3.1 The Diffie-Hellman protocol in terms of formal algebra –a parallel between groups and rings
2.3.2 The Discrete Logarithm Problem in noncommutative rings
2.3.3 The Discrete Logarithm Problem and cryptography using semirings
2.3.4 Semirings and cryptography
Bibliography to Chapters One and Two
Chapter Three
3.1 Idempotent Algebra
3.1.1 Dioids as lattices
3.1.2 Residuated maps
3.1.3 Semimodules over idempotent semirings
3.1.4 Residuated lattices
3.1.5 Construction of complete dioid
3.1.6 Matrices defined over idempotent semifields
3.1.7 Residuated operations over matrix semimodules
3.1.8 Max-plus algebra
3.1.9 Min-plus algebra
3.1.10 Max-time algebra
3.1.11 Min-time algebra
3.2 Linear Equations
3.3 Applications of Idempotent Algebra in Cryptography
Bibliography to Chapter Three
Chapter Four
4.1 Definitions and Motivation to Study
4.2 Distributed Secure Multicast Protocol
Bibliography to Chapter Four
Chapter Five
5.1 Endomorphism Semirings
5.2 Simplices and Simplicial Complexes
5.3 Cryptography Based on Endomorphism Semirings
5.3.1 Motivation, basic definitions and notations
5.3.2 Three key-exchange protocols based on endomorphism semirings
5.3.3 Four key exchange protocols using right identities of the simplex
Bibliography to Chapter Five
开源日期
2020-05-21
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。