Applications of Abstract Algebra with Maple and MATLAB, Second EditionCRC Press, 2006. gada 12. jūl. - 528 lappuses Eliminating the need for heavy number-crunching, sophisticated mathematical software packages open the door to areas like cryptography, coding theory, and combinatorics that are dependent on abstract algebra. Applications of Abstract Algebra with Maple and MATLAB®, Second Edition explores these topics and shows how to apply the software programs to abstract algebra and its related fields. Carefully integrating MapleTM and MATLAB®, this book provides an in-depth introduction to real-world abstract algebraic problems. The first chapter offers a concise and comprehensive review of prerequisite advanced mathematics. The next several chapters examine block designs, coding theory, and cryptography while the final chapters cover counting techniques, including Pólya's and Burnside's theorems. Other topics discussed include the Rivest, Shamir, and Adleman (RSA) cryptosystem, digital signatures, primes for security, and elliptic curve cryptosystems. New to the Second Edition With the incorporation of MATLAB, this second edition further illuminates the topics discussed by eliminating extensive computations of abstract algebraic techniques. The clear organization of the book as well as the inclusion of two of the most respected mathematical software packages available make the book a useful tool for students, mathematicians, and computer scientists. |
Saturs
Preliminary Mathematics 1 116 | 8 |
Block Designs | 29 |
Error Correcting Codes | 53 |
BCH Codes | 135 |
Algebraic Cryptography | 169 |
Vigenère Ciphers | 206 |
Computer Exercises | 240 |
The RSA Cryptosystem | 259 |
The Advanced Encryption Standard | 335 |
Pólya Theory | 389 |
Graph Theory | 417 |
Appendices | 445 |
B UserWritten MATLAB Functions | 461 |
481 | |
493 | |
Elliptic Curve Cryptography | 319 |
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
AES encryption process affine cipher BCH code beads block design bytesub CD-ROM Chapter ciphertext codewords coefficients colleague column complete summary compute construct contains convert cosets ctext cycle index decrypt the ciphertext determine downloaded at www.crcpress.com/e_products/downloads/download.asp?cat_no=C6102 elliptic curve encrypt the message encryption exponent entering the following entries Euclidean algorithm field elements finite field following command found in Appendix ftable group G Hadamard Hadamard matrix Hamming code Hill cipher index of coincidence initial key initial round input parameter insecure line intruder key matrix keyword linear code M-file maple modp Maple session MATLAB MATLAB session necklace nonzero elements ordered pairs output pattern inventory permutation plaintext positive integer preceding command prime primitive polynomial ptext Reed-Muller code RSA cryptosystem S-box session and saved Suppose Theorem user-written function variable vertices Vigenère cipher write a complete written separately