Publisher's Synopsis
This updated second edition, includes restructured and updated chapters on group based cryptography, new chapters on code-based and isogeny-based cryptography and new material on the mathematics of cryptographic protocols. Using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value.