ubiq logo - link to home page
Searching tips
  
YOUR BOOKSTORE ON CAMPUS - 100% STUDENT OWNED
University of Auckland (Ph 09 306 2700 option 1)
AUT - City & South (Ph 09 306 2700 option 2) & North (Ph 09 306 2700 option 3)
Unitec - Mount Albert Campus (Ph 09 306 2700 option 4)
Head Office / Distribution Centre / Online Orders (ph 09 306 2700 option 5)
Also servicing NorthTec, Toi Ohomai Institute of Technology and WITT (Ph 09 306 2704)
Home | About Us | Contact Us | Email Us | Account Holders Log In View Shopping Cart  
DISCOUNT OFF RRP / LIST PRICE ON MOST ITEMS FOR EVERYONE - NOT JUST STUDENTS!
University of Auckland, AUT, Unitec, NorthTec, Whitireia, WinTec, WelTec, WITT, Massey University, Victoria University, Canterbury University, Otago University,
Te Wananga o Aotearoa, Toi Ohomai Institute of Technology, Open Polytechnic, Christchurch Polytechnic, UCOL, Otago Polytechnic, independent tertiary institutions, etc

Title Details

RRP / List Price: $185.99

Title   Algebra for Applications : Cryptography Secret Sharing Error-Correcting Fingerprinting Compression 

ubiq Price: $167.39

Author   SLINKO Arkadii  ISBN   9783319219509  Add to shopping cart   
Publisher   Springer London  Group   Comp. Bks View shopping cart
Binding   Paperback Category   Networking  Terms and conditions
Edition   1 Type   Go back
Publication Year    
Subject   Algebra 
Stock Status   Not currently in stock - contact store for availability 
Order Status   Not currently on order 
Synopsis This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory.

This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study.

Add title to shopping cart | Can't find what you are looking for?

Prices on out of stock titles
are subject to change.
View shopping cart | Delivery Policy & Charges | Terms & Conditions
Guide to Searching | Links| Facebook
[email protected]