Using mathematical tools from number theory and finite fields, this text presents practical methods for solving problems in data security and data integrity. It covers many algorithms that arise in cryptography and error-control codes. Along with doubling the number of exercises, this edition includes a new appendix that reviews prerequisite top
Using mathematical tools from number theory and finite fields, this updated edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear algebra.
This book attempts to show the power of algebra in a relatively simple setting.-Mathematical Reviews, 2010
? The book supports learning by doing. In each section we can find many examples which clarify the mathematics introduced in the section and each section is followed by a series of exercises of which approximately half are solved in the end of the book. Additional the book comes with a CD-ROM containing an interactive version of the book powered by the computer algebra system Scientific Notebook. ? the mathematics in the book are developed as needed and the focus of the book lies clearly on learning by examples and exercises. ? the book gives good insight on how algebra can be used in coding and cryptography ? The strength of the book is clearly the number of examples ?-IACR book reviews,January 2010