zbMATH — the first resource for mathematics

Examples
Geometry Search for the term Geometry in any field. Queries are case-independent.
Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.
"Topological group" Phrases (multi-words) should be set in "straight quotation marks".
au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.
Chebyshev | Tschebyscheff The or-operator | allows to search for Chebyshev or Tschebyscheff.
"Quasi* map*" py: 1989 The resulting documents have publication year 1989.
so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.
"Partial diff* eq*" ! elliptic The not-operator ! eliminates all results containing the word elliptic.
dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.
py: 2000-2015 cc: (94A | 11T) Number ranges are accepted. Terms can be grouped within (parentheses).
la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

Operators
a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses
Fields
any anywhere an internal document identifier
au author, editor ai internal author identifier
ti title la language
so source ab review, abstract
py publication year rv reviewer
cc MSC code ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)
Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato. (English) Zbl 0890.94001
Algorithms and Computation in Mathematics. 3. Berlin: Springer. ix, 206 p. DM 98.00; öS 715.40; sFr 89.50; £37.50; $ 59.95 (1998).

This book is intended as a text for a course on cryptography, with an emphasis on algebraic methods. It is largely intended for graduate students in mathematics or computer science although it is not beyond the reach of advanced undergraduates. The first three chapters contain the background on cryptographic primitives, complexity and algebra, necessary to appreciate the last three chapters on three types of cryptographic systems: hidden monomial, combinatorial-algebraic and elliptic and hyperelliptic cryptosystems.

The first chapter on cryptography reviews the idea of public key cryptosystems and includes interesting discussions on RSA, hash functions, digital signatures, Diffie-Hellman key exchange, secret sharing, coin flipping, bit commitment and cryptosystems in general. The following chapter contains an informal, yet surprisingly comprehensive and useful, discussion of the notions of complexity so necessary for an understanding of some of the fundamental results of cryptography. After some elementary results on number theory and algorithms, it considers the classes of decision problems P, NP and NP-complete, as well as the notion of problem reduction and randomized algorithms. Chapter 3 on Algebra contains the standard material on finite fields and the Euclidean algorithm for polynomials, before introducing topics such as the Hilbert basis theorem, the Hilbert nullstellensatz theorem and Gröbner bases. The final three chapters contain discussions of specific cryptosystems not well covered in other texts on the subject. Chapter 4 introduces the Imai-Matsumoto cryptosystem and the technique of Patarin in both breaking this system as well as proposing extensions and generalizations of it. The fifth chapter considers combinatorial-algebraic cryptosystems and the implications of a theorem of Brassard on such systems.

The final chapter contains a review of the central problems associated with elliptic curve cryptosystems, including a discussion of the Jacobian of hyperelliptic curves, as a group for use in cryptography.

An appendix on hyperelliptic curves from an algebraic-geometric perspective, written by

Menezes, Wu and Zuccherato, is included. Answers to all problems in the text are also given.

The book is a welcome addition to the literature of cryptography.


MSC:
94-01Textbooks (information and communication)
94A60Cryptography
11Y16Algorithms; complexity (number theory)
11T71Algebraic coding theory; cryptography