£80.27

Springer Hiding Data - Selected Topics: Rudolf Ahlswede’s Lectures on Information Theory 3: 12 (Foundations in Signal Processing, Communications and Networking, 12)

Price data last checked 28 day(s) ago - will refresh soon

View at Amazon

We'll watch every seller, every day. One email when your price arrives.

It has never been this cheap. We have no record of a lower price.

£80 today · cheaper than every other day in the last 3 months

NEW HERE?

Amazon shows you one price. We show you all of them.

Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.

WHAT'S ON THIS PAGE

↓ Price chart
when this has been cheap or pricey
↓ Forecast
where the price is heading next
↓ Statistics
all-time high & low, recent range
↑ Price alert
name your number, we'll email you

Price History & Forecast

Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.

Last 63 days • 63 data points (No recent data available)

Historical
Generating forecast...
£85.07 £79.79 £80.94 £82.09 £83.25 £84.40 £85.55 22 February 2026 09 March 2026 25 March 2026 09 April 2026 25 April 2026

Price Distribution

Price distribution over 63 days • 4 price levels

Days at Price
Current Price
15 days · current 1 day 34 days 13 days 0 9 17 26 34 £80 £82 £84 £85 Days at Price

Price Analysis

Most common price: £84 (34 days, 54.0%)

Price range: £80 - £85

Price levels: 4 different prices over 63 days

Description

Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede’s lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rüdiger Reischuk contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs. From the Back Cover Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede’s lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rüdiger Reischuk contribute

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
22 April 2018
Listed Since
24 April 2018

Barcode

No barcode data available

Similar Products You Might Like

Partially Homomorphic Encryption
97% match

Partially Homomorphic Encryption

Springer

£97.06 24 Apr 2026
Alegebraic Curves and Cryptography (Fields Institute Communications) (Fields Institute Monographs)
96% match

Alegebraic Curves and Cryptography (Fields Institute Communications) (Fields Institute Monographs)

£81.95 11 Apr 2026
Data Privacy and Security (Springer Professional Computing)
96% match

Data Privacy and Security (Springer Professional Computing)

Springer

£61.55 26 Feb 2026
Partially Homomorphic Encryption
96% match

Partially Homomorphic Encryption

Springer

£82.28 08 Apr 2026
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
96% match

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

Springer

£39.90 20 Apr 2026
A Multidisciplinary Introduction to Information Security (Discrete Mathematics and Its Applications)
96% match

A Multidisciplinary Introduction to Information Security (Discrete Mathematics and Its Applications)

CRC Press

£106.00 14 Jan 2026
Secure Quantum Network Coding Theory
96% match

Secure Quantum Network Coding Theory

Springer

£115.73 19 Feb 2026
Understanding and Applying Cryptography and Data Security
96% match

Understanding and Applying Cryptography and Data Security

CRC Press

£59.27 07 Mar 2026
Cryptology: Classical and Modern (Chapman & Hall/CRC Cryptography and Network Security Series)
96% match

Cryptology: Classical and Modern (Chapman & Hall/CRC Cryptography and Network Security Series)

CRC Press

£91.99 09 Mar 2026
Applied Cryptography: Protocols, Algorithms and Source Code in C
96% match

Applied Cryptography: Protocols, Algorithms and Source Code in C

Wiley

£35.97 28 Apr 2026
Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Discrete Mathematics and Its Applications)
96% match

Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Discrete Mathematics and Its Applications)

CRC Press

£79.06 13 Jan 2026
Introduction to Cryptography with Open-Source Software (Discrete Mathematics and Its Applications)
96% match

Introduction to Cryptography with Open-Source Software (Discrete Mathematics and Its Applications)

CRC Press

£48.79 23 Jan 2026
Springer Communication Security: Cryptography & Physical Layer
96% match

Springer Communication Security: Cryptography & Physical Layer

Springer

£107.85 26 Apr 2026
Secret History: The Story of Cryptology (Chapman & Hall/CRC Cryptography and Network Security Series)
96% match

Secret History: The Story of Cryptology (Chapman & Hall/CRC Cryptography and Network Security Series)

£44.27 25 Jan 2026
Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, ... (Lecture Notes in Computer Science, 13092)
96% match

Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, ... (Lecture Notes in Computer Science, 13092)

Springer

£85.56 09 Mar 2026
Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security: 447 (Lecture Notes in Electrical Engineering, 447)
96% match

Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security: 447 (Lecture Notes in Electrical Engineering, 447)

Springer

£97.01 01 Mar 2026
Secret History: The Story of Cryptology (Chapman & Hall/CRC Cryptography and Network Security Series)
96% match

Secret History: The Story of Cryptology (Chapman & Hall/CRC Cryptography and Network Security Series)

CRC Press

£79.81 23 Feb 2026
Physical-Layer Security and Quantum Key Distribution
96% match

Physical-Layer Security and Quantum Key Distribution

Springer

£49.20 05 Apr 2026
Disappearing Cryptography: Information Hiding: Steganography & Watermarking: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)
96% match

Disappearing Cryptography: Information Hiding: Steganography & Watermarking: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)

Morgan Kaufmann

£45.19 14 Apr 2026
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
96% match

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

Springer

£54.11 06 May 2026
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
96% match

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

Springer

£51.29 12 Jan 2026
Introduction to Cryptography: Principles and Applications (Information Security and Cryptography)
96% match

Introduction to Cryptography: Principles and Applications (Information Security and Cryptography)

Springer

£39.84 07 Mar 2026
Guide to Elliptic Curve Cryptography (Springer Professional Computing)
96% match

Guide to Elliptic Curve Cryptography (Springer Professional Computing)

Springer

£93.24 02 May 2026
Locally Decodable Codes and Private Information Retrieval Schemes (Information Security and Cryptography)
96% match

Locally Decodable Codes and Private Information Retrieval Schemes (Information Security and Cryptography)

Springer

£72.98 23 Apr 2026