|
|
|
|
LEADER |
02563nmm a2200433 u 4500 |
001 |
EB000686199 |
003 |
EBX01000000000000000539281 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
140122 ||| eng |
020 |
|
|
|a 9783662032695
|
100 |
1 |
|
|a Salomaa, Arto
|
245 |
0 |
0 |
|a Public-Key Cryptography
|h Elektronische Ressource
|c by Arto Salomaa
|
250 |
|
|
|a 2nd ed. 1996
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 1996, 1996
|
300 |
|
|
|a X, 275 p
|b online resource
|
505 |
0 |
|
|a 1. Classical Two-Way Cryptography -- 2. The Idea of Public Keys -- 3. Knapsack Systems -- 4. RSA -- 5. Other Bases of Cryptosystems -- 6. Cryptographic Protocols: Surprising Vistas for Communication -- Appendix A. Tutorial in Complexity Theory -- Appendix B. Tutorial in Number Theory -- Problems -- Historical and Bibliographical Remarks -- References
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Computer science / Mathematics
|
653 |
|
|
|a Applied Dynamical Systems
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Mathematical Applications in Computer Science
|
653 |
|
|
|a Nonlinear theories
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Dynamics
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b SBA
|a Springer Book Archives -2004
|
490 |
0 |
|
|a Texts in Theoretical Computer Science. An EATCS Series
|
028 |
5 |
0 |
|a 10.1007/978-3-662-03269-5
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-662-03269-5?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 006.3
|
520 |
|
|
|a Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992
|