|
|
|
|
LEADER |
02533nmm a2200361 u 4500 |
001 |
EB000373905 |
003 |
EBX01000000000000000226957 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783540285205
|
100 |
1 |
|
|a Rothe, Jörg
|
245 |
0 |
0 |
|a Complexity Theory and Cryptology
|h Elektronische Ressource
|b An Introduction to Cryptocomplexity
|c by Jörg Rothe
|
250 |
|
|
|a 1st ed. 2005
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2005, 2005
|
300 |
|
|
|a XII, 478 p
|b online resource
|
505 |
0 |
|
|a to Cryptocomplexity -- Foundations of Computer Science and Mathematics -- Foundations of Complexity Theory -- Foundations of Cryptology -- Hierarchies Based on NP -- Randomized Algorithms and Complexity Classes -- RSA Cryptosystem, Primality, and Factoring -- Other Public-Key Cryptosystems and Protocols
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Computer science
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Theory of Computation
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Texts in Theoretical Computer Science. An EATCS Series
|
028 |
5 |
0 |
|a 10.1007/3-540-28520-2
|
856 |
4 |
0 |
|u https://doi.org/10.1007/3-540-28520-2?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 004.0151
|
520 |
|
|
|a Modern cryptology employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research in complexity theory often is motivated by questions and problems arising in cryptology. This book takes account of this trend, and therefore its subject is what may be dubbed "cryptocomplexity,'' some sort of symbiosis of these two areas. This textbook is suitable for undergraduate and graduate students of computer science, mathematics, and engineering, and can be used for courses on complexity theory and cryptology, preferably by stressing their interrelation. Starting from scratch, it is an accessible introduction to cryptocomplexity and works its way to the frontiers of current research. It provides the necessary mathematical background, has numerous figures, exercises, and examples, and presents some central, up-to-date research topics and challenges. Due to its comprehensive bibliography and subject index, it is also a valuable source for researchers, teachers, and practitioners working in these fields
|