Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This is a book about Gröbner bases and their applications. It contains 3 chapters, 20 sections, 44 tutorials, 165 exercises, and numerous further amusements. It is going to help you bridge the gap between theoretical computer algebra and actual computation. We hope you will have as much fun reading it as the authors had writing it! From the reviews: "This is one of the most refreshing mathematical books I have ever held in my hands. This is academic teaching at its best; if I had not seen it, I would not have believed that it could be done so well." (Hans Stetter, IMN - Internationale Mathematische Nachrichten 2003) "Every paragraph of the book shows how much the authors have enjoyed translating into printed matter the outcome of a long, large, deep and personal relation with computationally oriented commutative algebra. And the result is a non-standard, elementary and self-contained introduction to the theory of Gröbner bases and its applications." (Laureano González-Vega and Tomás Recio, ACM SIGSAM Bulletin 2004) "The style of this book merits a comment. Each section begins with a quotation and an overview in which "Italian imagination overtakes German rigor". These introductions and the following main bodies of each section are well written, engaging and often amusing. The book is a pleasure to read." (John Little, Mathematical Reviews 2001)
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Grobner Basis Methods in Cryptography Lattice-Based Cryptography
gelegt ist.
"The second volume of the authors' 'Computational commutative algebra'...covers on its 586 pages a wealth of interesting material with several unexpected applications. The text is recommended for all those who want to learn and enjoy an algebraic tool that becomes more and more relevant to different fields of applications."
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.