Keith Devlin and Jonathan Borwein, two well-known mathematicians with expertise in different mathematical specialties but with a common interest in experimentation in mathematics, have joined forces to create this introduction to experimental mathematics.
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems.
Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level.
A Beginner's Guide to Mathematical Proof prepares mathematics majors for the transition to abstract mathematics, as well as introducing a wider readership of quantitative science students, such as engineers, to the mathematical structures underlying more applied topics.
This vividly illustrated history of the International Congress of Mathematicians- a meeting of mathematicians from around the world held roughly every four years- acts as a visual history of the 25 congresses held between 1897 and 2006, as well as a story of changes in the culture of mathematics over the past century.
From the editors of the popular Making Mathematics with Needlework, this book presents projects that highlight the relationship between types of needlework and mathematics.
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems.
A Beginner's Guide to Mathematical Proof prepares mathematics majors for the transition to abstract mathematics, as well as introducing a wider readership of quantitative science students, such as engineers, to the mathematical structures underlying more applied topics.
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature.
Discrete Mathematics: An Open Introduction, Fourth Edition aims to provide an introduction to select topics in discrete mathematics at a level appropriate for first or second year undergraduate math and computer science majors, especially those who intend to teach middle and high school mathematics.
Methods Used to Solve Discrete Math ProblemsInteresting examples highlight the interdisciplinary nature of this areaPearls of Discrete Mathematics presents methods for solving counting problems and other types of problems that involve discrete structures.
This compilation of papers presented at the 2000 European Summer Meeting of the Association for Symbolic Logic marks the centenial anniversery of Hilbert's famous lecture.
Fuzzy social choice theory is useful for modeling the uncertainty and imprecision prevalent in social life yet it has been scarcely applied and studied in the social sciences.
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems.
A dissection involves cutting a polygon into pieces in such a way that those pieces form another polygon; for a hinged dissection, the pieces must be attached by hinges.
Keine ausführliche Beschreibung für "Arithmetische Bestimmung von Grundeinheit und Klassenzahl in zyklischen kubischen und biquadratischen Zahlkörpern" verfügbar.