The Leading eBooks Store Online
3,725,826 members ⚫ 1,209,635 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Springer US 2007; US$ 95.15
This professional book covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. It presents useful guidelines for proper use of RSA in information security and is the first book to cover its subject exclusively. more...
- Springer US 2009; US$ 148.01
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman)... more...
- Wiley 2012; US$ 103.95 US$ 90.09
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified... more...
- World Scientific Publishing Company 1996; US$ 82.00 US$ 71.34
This book is about perfect, amicable and sociable numbers, with an emphasis on amicable numbers, from both a mathematical and particularly a computational point of view. Perfect and amicable numbers have been studied since antiquity, nevertheless, many problems still remain. The book introduces the basic concepts and results of perfect, amicable and... more...
- World Scientific Publishing Company 1998; US$ 54.00 US$ 46.98
This book provides a concise and modern introduction to Formal Languages and Machine Computation, a group of disparate topics in the theory of computation, which includes formal languages, automata theory, turing machines, computability, complexity, number-theoretic computation, public-key cryptography, and some new models of computation, such as quantum... more...
- Springer Berlin Heidelberg 2013; US$ 74.00
Mathematicians do not study objects, but relations among objectsj they are indifferent to the replacement of objects by others as long as relations do not change. Matter is not important, only form interests them. HENRI POINCARE (1854-1912) Computer scientists working on algorithms for factorization would be well advised to brush up on their number... more...
- Springer US 2014; US$ 95.15
This book introduces basic concepts and ideas of quantum computing and quantum computational complexity. It discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystems and covers many alternative post-quantum cryptosystems. more...
- Springer International Publishing 2015; US$ 79.29
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation,... more...
- Springer Berlin Heidelberg 2011; US$ 148.01
Principles of Compilers explores the natural intelligence of human beings by comparing the compilations of natural languages with programming languages. Readers will find a thorough explanation the LL(1) and LR(1) parsing methods. more...