Mathematical cryptology for computer scientists and mathematicians:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Totowa, NJ
Rowman & Littlefield
1987
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXII, 312 S. Ill. |
ISBN: | 084767438X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV006142707 | ||
003 | DE-604 | ||
005 | 20080207 | ||
007 | t | ||
008 | 921030s1987 a||| |||| 00||| eng d | ||
020 | |a 084767438X |9 0-8476-7438-X | ||
035 | |a (OCoLC)13665146 | ||
035 | |a (DE-599)BVBBV006142707 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-739 |a DE-29T | ||
050 | 0 | |a Z103 | |
082 | 0 | |a 652/.8 |2 19 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Patterson, Wayne |d 1946- |e Verfasser |0 (DE-588)1036967727 |4 aut | |
245 | 1 | 0 | |a Mathematical cryptology for computer scientists and mathematicians |c Wayne Patterson |
264 | 1 | |a Totowa, NJ |b Rowman & Littlefield |c 1987 | |
300 | |a XXII, 312 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Cryptographie |2 ram | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 7 | |a PASCAL |2 inriac | |
650 | 7 | |a RSA |2 inriac | |
650 | 7 | |a clé accès |2 inriac | |
650 | 7 | |a codage donnée |2 inriac | |
650 | 7 | |a complexité calcul |2 inriac | |
650 | 7 | |a complétude |2 inriac | |
650 | 7 | |a corps Galois |2 inriac | |
650 | 7 | |a cryptographie |2 inriac | |
650 | 7 | |a groupe |2 inriac | |
650 | 7 | |a normalisation |2 inriac | |
650 | 7 | |a problème knapsack |2 inriac | |
650 | 7 | |a sécurité donnée |2 inriac | |
650 | 7 | |a théorie nombre |2 inriac | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Mathematik |0 (DE-588)4037944-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Mathematik |0 (DE-588)4037944-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003883055&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-003883055 |
Datensatz im Suchindex
_version_ | 1804120368600842240 |
---|---|
adam_text | IMAGE 1
MATHEMATICAL
CRYPTOLOGY FOR COMPUTER SCIENTISTS AND MATHEMATICIANS
WAYNE PATTERSON DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF NEW ORLEANS
ROWMAN & LITTLEFIELD PUBLISHERS
IMAGE 2
CONTENTS
TABLES, XI FIGURES, XII
ACKNOWLEDGMENTS, XIII
SYMBOLS, XV
INTRODUCTION, XIX
CHAPTER 1 CRYPTOGRAPHY BEFORE 1970, 1
THE CAESAR SHIFT, 1 THE MODEL FOR A CRYPTOGRAPHIC SYSTEM, 2 ATTACK NO.
1: EXHAUSTIVE KEY SEARCH, 5 TRANSPOSITION CRYPTOSYSTEMS, 6
SUBSTITUTION CRYPTOSYSTEMS, 8 ATTACK NO. 2: FREQUENCY ANALYSIS, 9 ATTACK
NO. 3: FREQUENCY ANALYSIS OF DIGRAMS, 14 ROTOR MACHINES, 15 FINAL
COMMENTS, 17 HINTS FOR SOME EXERCISES, 17
CHAPTER 2 THE DATA ENCRYPTION STANDARD, 18
THE DECRYPTION PROCESS, 27 COMMENTS, 30 POTENTIAL ATTACKS ON THE DES, 30
IMAGE 3
VI CONTENTS
COMMERCIAL AND GOVERNMENT USE OF THE DES, 31 DES DEVICES, 31 GROUP
PROPERTIES OF THE DES, 32 HINT FOR EXERCISE 2.4, 33
CHAPTER 3 THE PUBLIC-KEY PARADIGM, 34
THE KEY MANAGEMENT PROBLEM, 34 THE PKC MODEL, 35 AUTHENTICATION, 36
CHAPTER 4 THE KNAPSACK APPROACH TO PUBLIC-KEY CRYPTOGRAPHY, 37
EASY KNAPSACK SETS, 38 SUPER-INCREASING SUBSET DECOMPOSITION
ALGORITHM, 38 THE FIRST PUBLIC-KEY CRYPTOSYSTEM PROPOSED, 39
THE BASIC MERKLE-HELLMAN TRANSFORMATION, 39 GRAHAM-SHAMIR KNAPSACKS, 42
ITERATED KNAPSACKS, 43 COMPARISONS OF THE KNAPSACK APPROACHES AND DES,
44
FINAL COMMENTS, 44
CHAPTER 5 THE RSA ALGORITHM, 45
FACTORING, 45 RIVEST-SHAMIR-ADLEMAN ALGORITHM, 46 THE SOLOVAY-STRASSEN
TEST, 50 THE LEHMANN AND PERALTA TEST, 51
FINAL COMMENTS, 52
CHAPTER 6 BREAKING KNAPSACKS, 54
THE SHAMIR ATTACK, 54 BREAKING A SMALL KNAPSACK EXAMPLE, 55 CONSTRUCTING
THE SHAMIR ATTACK, 60 THE LENSTRA-LENSTRA-LOVASZ (L 3 ) ALGORITHM, 64
IMAGE 4
CONTENTS # VII
REDUCED BASES AND SHORT VECTORS, 68 THE REDUCED BASIS ALGORITHM, 70
USING THE L 3 - ALGORITHM TO COMPLETE THE SHAMIR ATTACK, 72
THE LAGARIAS-ODLYZKO ATTACK, 74 BRICKELL S ATTACK, 75
CHAPTER 7 THE CHOR-RIVEST ALGORITHM AND OTHER PROPOSED PUBLIC-KEY
CRYPTOSYSTEMS, 76
THE MCELIECE METHOD USING ALGEBRAIC CODING, 76 CODING THEORY, 76 METRICS
ON BIT STRINGS, 77 GROUP CODES, 80
GENERATING GROUP CODES, 80 CANONICAL PARITY-CHECK MATRIX, 81 HAMMING
CODES, 82 DECODING, 83 DECODING A GROUP CODE, 83
SYNDROME, 84 GALOIS FIELD CODES AND GOPPA CODES, 85 PROPERTIES OF GOPPA
CODES, 85
THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM, 88 ENCRYPTION, 89 DECRYPTION, 89
DISCUSSION, 89
THE COOPER-PATTERSON KNAPSACK PKC USING GALOIS FIELDS, 90 ENCRYPTION, 90
DECRYPTION, 91
THE CHOR-RIVEST KNAPSACK-TYPE PKC, 95 DEFINING THE CRYPTOSYSTEM, 97
SYSTEM TJENERATION, 98 ENCRYPTION, 98
DECRYPTION, 99 THE TRANSFORMATION FROM INTEGERS TO P-BIT STRINGS WITH
WEIGHT N, 99
IMAGE 5
VIII CONTENTS
AN EXAMPLE OF THE CHOR-RIVEST KNAPSACK ALGORITHM, 102 PKC PERFORMANCE,
103 EXAMPLES OF PRIME POWER PAIRS WHERE P N -L HAS ONLY
SMALL PRIME FACTORS, 104 POSSIBLE CRYPTOGRAPHIC ATTACKS, 105 VARIATIONS
ON THE RSA ALGORITHM, 107 COMMENTS ON THE RSA VARIATIONS, 109
WAGNER S WORD PROBLEM PKC PROPOSAL, 109 FINITELY PRESENTED GROUPS, 110
PROPOSAL FOR A WORD PROBLEM PKC, 112 CONSTRUCTING A FINITELY PRESENTED
GROUP IN WHICH NO
SOLUTION TO THE WORD PROBLEM EXISTS, 113 CONCLUSIONS, 114
CHAPTER 8 OTHER SECURITY PROBLEMS, 115
THE AUTHENTICATION PROBLEM, 115 THE ONG-SCHNORR-SHAMIR SCHEMES, 118 THE
OBLIVIOUS TRANSFER, 120 OBLIVIOUS TRANSFER FOR COIN FLIPPING BY
TELEPHONE, 122
MENTAL POKER, 122 ONE-WAY ENCRYPTION FUNCTIONS, 124 THRESHOLD SCHEMES,
125 THE ASMUTH-BLOOM THRESHOLD SCHEME, 127
BLAKLEY S THRESHOLD SCHEME, 127 THE KARNIN-GREENE-HELLMAN THRESHOLD
SCHEME, 128 A GENERALIZATION, 129 RAMP SCHEMES, 129 ENCRYPTION IN DATA
BASES, 130
AN APPLICATION OF THE CHINESE REMAINDER THEOREM TO MULTIPLE-KEY
ENCRYPTION IN DATA BASE SYSTEMS, 131 THE ENCRYPTION PROCESS, 132 THE
DECRYPTION PROCESS, 132 REMARKS, 133
IMAGE 6
CONTENTS IX
CHAPTER 9 STANDARDIZATION OF PUBLIC-KEY ENCRYPTION, 134
WHY STANDARDIZE? 134 WHO STANDARDIZES? 136 WHO S WORKING ON
STANDARDIZING PUBLIC-KEY ENCRYPTION? 137
SCOPE OF THE WORKING GROUP, 137 CLASSIFICATION, 138 REQUIREMENTS FOR
APPLICATIONS, 141
SMART CARDS, 142 EXAMPLES, 143 TECHNICAL PROPERTIES, 146
FURTHER INFORMATION ON THE SECURITY OF AVAILABLE PUBLIC- KEY ALGORITHMS,
147 CONCLUSIONS, 149
CHAPTER 10 ATTEMPTING TO CRYPTANALYZE THE DES, 151
DESCRIPTION OF THE DES IN GROUP-THEORETIC TERMS, 152 SOME FURTHER
GROUP-THEORETIC TERMINOLOGY, 155 ATTACKS ON THE DES, 155 GROUP
PROPERTIES OF THE DES, 156 THE BIRTHDAY PARADOX, 156
MEET-IN-THE-MIDDLE METHODS, 160 THE MIT EXPERIMENTS, 161 THE CYCLING
CLOSURE TEST, 162 THE FLOYD TWO-FINGER ALGORITHM, 163
CUSTOM HARDWARE FOR THE MIT CYCLING EXPERIMENTS, 165 SHAMIR S REMARKABLE
SYMMETRIES, 167
APPENDIX I MODULAR ARITHMETIC, 172
APPENDIX II GROUPS, 174
SUBGROUPS AND HOMOMORPHISMS, 175 CYCLIC GROUPS, 177
IMAGE 7
X CONTENTS
COSETS AND THE INDEX OF A SUBGROUP, 177
APPENDIX III ELEMENTARY NUMBER THEORY, 180
FAST EXPONENTIATION, 180 THE EULER 0-FUNCTION, 181 THE EUCLIDEAN
ALGORITHM, 183 LINEAR EQUATIONS, 184
QUADRATIC RESIDUES, 185
APPENDIX IV COMPUTATIONAL COMPLEXITY AND THE THEORY OF NP-COMPLETENESS
188
HOW TO MEASURE THE COMPLEXITY OF A PROBLEM, 190 BIG-OH, 192 POLYNOMIAL
TIME COMPLEXITY AND THE CATEGORY P, 192 THE OTHER EXTREME: UNDECIDABLE
PROBLEMS AND CATEGORY
U, 193
NON-POLYNOMIAL PROBLEMS (NON-POLY), 193 NP-COMPLETENESS, 194 NP-COMPLETE
PROBLEMS AS BASES FOR CRYPTOSYSTEMS, 195
APPENDIX V GALOIS FIELDS, 196
WHY STUDY FIELDS? 197 RINGS, 197 SUBRINGS, 199
POLYNOMIAL RINGS, 202 FIELD EXTENSIONS, 206 STRUCTURE THEORY OF FINITE
FIELDS, 208
CONCLUSIONS, 211
APPENDIX VI SELECTED PASCAL PROGRAMS, 212
BIBLIOGRAPHY, 287
INDEX, 295
|
any_adam_object | 1 |
author | Patterson, Wayne 1946- |
author_GND | (DE-588)1036967727 |
author_facet | Patterson, Wayne 1946- |
author_role | aut |
author_sort | Patterson, Wayne 1946- |
author_variant | w p wp |
building | Verbundindex |
bvnumber | BV006142707 |
callnumber-first | Z - Library Science |
callnumber-label | Z103 |
callnumber-raw | Z103 |
callnumber-search | Z103 |
callnumber-sort | Z 3103 |
callnumber-subject | Z - Books and Writing |
classification_rvk | ST 273 ST 276 |
ctrlnum | (OCoLC)13665146 (DE-599)BVBBV006142707 |
dewey-full | 652/.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652/.8 |
dewey-search | 652/.8 |
dewey-sort | 3652 18 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02031nam a2200577 c 4500</leader><controlfield tag="001">BV006142707</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">921030s1987 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">084767438X</subfield><subfield code="9">0-8476-7438-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)13665146</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV006142707</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">Z103</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652/.8</subfield><subfield code="2">19</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Patterson, Wayne</subfield><subfield code="d">1946-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1036967727</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mathematical cryptology for computer scientists and mathematicians</subfield><subfield code="c">Wayne Patterson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Totowa, NJ</subfield><subfield code="b">Rowman & Littlefield</subfield><subfield code="c">1987</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 312 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">PASCAL</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">RSA</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">clé accès</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">codage donnée</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">complexité calcul</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">complétude</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">corps Galois</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">groupe</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">normalisation</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">problème knapsack</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité donnée</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">théorie nombre</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mathematik</subfield><subfield code="0">(DE-588)4037944-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mathematik</subfield><subfield code="0">(DE-588)4037944-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003883055&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-003883055</subfield></datafield></record></collection> |
id | DE-604.BV006142707 |
illustrated | Illustrated |
indexdate | 2024-07-09T16:40:59Z |
institution | BVB |
isbn | 084767438X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-003883055 |
oclc_num | 13665146 |
open_access_boolean | |
owner | DE-703 DE-739 DE-29T |
owner_facet | DE-703 DE-739 DE-29T |
physical | XXII, 312 S. Ill. |
publishDate | 1987 |
publishDateSearch | 1987 |
publishDateSort | 1987 |
publisher | Rowman & Littlefield |
record_format | marc |
spelling | Patterson, Wayne 1946- Verfasser (DE-588)1036967727 aut Mathematical cryptology for computer scientists and mathematicians Wayne Patterson Totowa, NJ Rowman & Littlefield 1987 XXII, 312 S. Ill. txt rdacontent n rdamedia nc rdacarrier Cryptographie ram Databescherming gtt Geheimschrift gtt PASCAL inriac RSA inriac clé accès inriac codage donnée inriac complexité calcul inriac complétude inriac corps Galois inriac cryptographie inriac groupe inriac normalisation inriac problème knapsack inriac sécurité donnée inriac théorie nombre inriac Cryptography Mathematik (DE-588)4037944-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Mathematik (DE-588)4037944-9 s DE-604 HEBIS Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003883055&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Patterson, Wayne 1946- Mathematical cryptology for computer scientists and mathematicians Cryptographie ram Databescherming gtt Geheimschrift gtt PASCAL inriac RSA inriac clé accès inriac codage donnée inriac complexité calcul inriac complétude inriac corps Galois inriac cryptographie inriac groupe inriac normalisation inriac problème knapsack inriac sécurité donnée inriac théorie nombre inriac Cryptography Mathematik (DE-588)4037944-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4037944-9 (DE-588)4033329-2 |
title | Mathematical cryptology for computer scientists and mathematicians |
title_auth | Mathematical cryptology for computer scientists and mathematicians |
title_exact_search | Mathematical cryptology for computer scientists and mathematicians |
title_full | Mathematical cryptology for computer scientists and mathematicians Wayne Patterson |
title_fullStr | Mathematical cryptology for computer scientists and mathematicians Wayne Patterson |
title_full_unstemmed | Mathematical cryptology for computer scientists and mathematicians Wayne Patterson |
title_short | Mathematical cryptology for computer scientists and mathematicians |
title_sort | mathematical cryptology for computer scientists and mathematicians |
topic | Cryptographie ram Databescherming gtt Geheimschrift gtt PASCAL inriac RSA inriac clé accès inriac codage donnée inriac complexité calcul inriac complétude inriac corps Galois inriac cryptographie inriac groupe inriac normalisation inriac problème knapsack inriac sécurité donnée inriac théorie nombre inriac Cryptography Mathematik (DE-588)4037944-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptographie Databescherming Geheimschrift PASCAL RSA clé accès codage donnée complexité calcul complétude corps Galois cryptographie groupe normalisation problème knapsack sécurité donnée théorie nombre Cryptography Mathematik Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003883055&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pattersonwayne mathematicalcryptologyforcomputerscientistsandmathematicians |