Skip to content
Register Sign in Wishlist
Protecting Information

Protecting Information
From Classical Error Correction to Quantum Cryptography

CAD$170.95 (X)

  • Date Published: July 2006
  • availability: In stock
  • format: Hardback
  • isbn: 9780521827409

CAD$ 170.95 (X)

Add to cart Add to wishlist

Other available formats:
Paperback, eBook

Looking for an examination copy?

This title is not currently available for examination. However, if you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact providing details of the course you are teaching.

Product filter button
About the Authors
  • For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the potential impacts of quantum physics: (i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices.

    • Accessible to readers familiar with matrix algebra, vector spaces and complex numbers
    • First undergraduate text to cover cryptography, error-correction, and quantum computation together
    • Features exercises designed to enhance understanding, including a number of computational problems, available from
    Read more

    Reviews & endorsements

    "The authors have combined the two 'hot' subjects of cryptography and coding, looking at each with regard to both classical and quantum models of computing and communication. These exciting topics are unified through the steady, consistent development of algebraic structures and techniques. Students who read this book will walk away with a broad exposure to both the theory and the concrete application of groups, finite fields, and vector spaces."
    Ben Lotto, Vassar College

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity


    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?


    Product details

    • Date Published: July 2006
    • format: Hardback
    • isbn: 9780521827409
    • length: 304 pages
    • dimensions: 243 x 160 x 20 mm
    • weight: 0.551kg
    • contains: 14 tables 159 exercises
    • availability: In stock
  • Table of Contents

    1. Cryptography: an overview
    2. Quantum mechanics
    3. Quantum cryptography
    4. An introduction to error-correcting codes
    5. Quantum cryptography revisited
    6. Generalized Reed-Solomon codes
    7. Quantum computing

  • Instructors have used or reviewed this title for the following courses

    • Management Science
  • Authors

    Susan Loepp, Williams College, Massachusetts
    Susan Loepp is an Associate Professor of Mathematics in the Department of Mathematics and Statistics at Williams College. Her research is in commutative algebra, focusing on completions of local rings.

    William K. Wootters, Williams College, Massachusetts
    William K. Wootters, a Fellow of the American Physical Society, is the Barclay Jermain Professor of Natural Philosophy in the Department of Physics at Williams College. He does research on quantum entanglement and other aspects of quantum information theory.

Sign In

Please sign in to access your account


Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner Please see the permission section of the catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.


Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

Please fill in the required fields in your feedback submission.