Public key cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | German |
Veröffentlicht: |
Berlin; Heidelberg; New York; Barcelona; Budapest; Hong Kong; London; Milán; París; Santa Clara; Singapur; Tokio
Springer
1996
|
Ausgabe: | Second, enlarged edition |
Schriftenreihe: | Texts in theoretical computer science
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | X, 271 Seiten Ill. |
ISBN: | 3540613560 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV010896979 | ||
003 | DE-604 | ||
005 | 20240616 | ||
007 | t | ||
008 | 960805s1996 gw a||| |||| 00||| ger d | ||
010 | |a 96031537 | ||
020 | |a 3540613560 |c Pp. : DM 68.00 |9 3-540-61356-0 | ||
035 | |a (OCoLC)833014413 | ||
035 | |a (DE-599)BVBBV010896979 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
044 | |a gw |c DE | ||
049 | |a DE-29T |a DE-384 |a DE-20 |a DE-739 |a DE-91 |a DE-91G |a DE-703 |a DE-M347 |a DE-355 |a DE-92 |a DE-19 |a DE-1046 |a DE-M158 |a DE-526 |a DE-83 |a DE-11 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 20 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Salomaa, Arto |d 1934- |e Verfasser |0 (DE-588)121031764 |4 aut | |
245 | 1 | 0 | |a Public key cryptography |c Arto Salomaa |
246 | 1 | 3 | |a Public-key cryptography |
250 | |a Second, enlarged edition | ||
264 | 1 | |a Berlin; Heidelberg; New York; Barcelona; Budapest; Hong Kong; London; Milán; París; Santa Clara; Singapur; Tokio |b Springer |c 1996 | |
300 | |a X, 271 Seiten |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Texts in theoretical computer science | |
650 | 7 | |a Computabilidade e modelos de computacao |2 larpcal | |
650 | 4 | |a Cryptographie | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 4 | |a Ordinateurs - Accès - Contrôle | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Public key cryptography | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computer |0 (DE-588)4070083-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computer |0 (DE-588)4070083-5 |D s |
689 | 1 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | 1 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 2 | |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-007287771 |
Datensatz im Suchindex
_version_ | 1813525178997538816 |
---|---|
adam_text |
ARTO SALOMAA PUBLIC-KEY CRYPTOGRAPHY SECOND, ENLARGED EDITION WITH 22
FIGURES SPRINGER CONTENTS CHAPTER 1. CLASSICAL TWO-WAY CRYPTOGRAPHY 1
1.1 CRYPTOSYSTEMS AND CRYPTANALYSIS 1 1.2 MONOALPHABETIC SYSTEMS 10 1.3
POLYALPHABETIC AND OTHER SYSTEMS 22 1.4 ROTORS AND DES 39 CHAPTER 2. THE
IDEA OF PUBLIC KEYS 55 2.1 SOME STREETS ARE ONE-WAY 55 2.2 HOW TO
REALIZE THE IDEA 64 2.3 OBVIOUS ADVANTAGES OF PUBLIC KEYS 71 CHAPTER 3.
KNAPSACK SYSTEMS 77 3.1 A TRAPDOOR IS BUILT 77 3.2 HOW TO FIND THE
TRAPDOOR 87 3.3 THEORY OF REACHABILITY 96 3.4 TRYING TO HIDE THE
TRAPDOOR AGAIN 108 3.5 DENSE KNAPSACKS 117 CHAPTER 4. RSA 125 4.1 LEGAL
WORLD 125 4.2 ATTACK AND DEFENSE 134 4.3 PRIMALITY 137 4.4 CRYPTANALYSIS
AND FACTORING 143 4.5 PARTIAL INFORMATION ON RSA 147 4.6 DISCRETE
LOGARITHMS AND KEY EXCHANGE 154 CHAPTER 5. OTHER BASES OF CRYPTOSYSTEMS
159 5.1 EXPONENTIATION IN QUADRATIC FIELDS 159 5.2 ITERATION OF
MORPHISMS 166 5.3 AUTOMATA AND LANGUAGE THEORY 174 5.4 CODING THEORY .
178 CHAPTER 6. CRYPTOGRAPHIC PROTOCOLS: SURPRISING VISTAS FOR
COMMUNICATION 18 1 6.1 MORE THAN ETIQUETTE 181 6.2 COIN FLIPPING BY
TELEPHONE. POKER REVISITED 184 6.3 HOW TO SHARE A SECRET 187 6.4 PARTIAL
DISCLOSURE OF SECRETS 190 6.5 OBLIVIOUS TRANSFER 194 6.6 APPLICATIONS:
BANKING AND BALLOTS 200 7 X CONTENTS 6.7 CONVINCING PROOFS WITH NO
DETAILS 202 6.8 ZERO-KNOWLEDGE PROOFS 208 6.9 ZERO-KNOWLEDGE PROOFS OF
IDENTITY 213 6.10 SECRET BALLOTING SYSTEMS REVISITED 218 6.11
CRYPTOGRAPHIC PROTOCOLS WITHOUT COMPUTERS 234 APPENDIX A. TUTORIAL IN
COMPLEXITY THEORY 245 APPENDIX B. TUTORIAL IN NUMBER THEORY 249 PROBLEMS
255 HISTORICAL AND BIBLIOGRAPHICAL REMARKS 263 REFERENCES 265 INDEX 269
ARTO SALOMAA PUBLIC-KEY CRYPTOGRAPHY SECOND, ENLARGED EDITION WITH 22
FIGURES SPRINGER CONTENTS CHAPTER 1. CLASSICAL TWO-WAY CRYPTOGRAPHY 1
1.1 CRYPTOSYSTEMS AND CRYPTANALYSIS 1 1.2 MONOALPHABETIC SYSTEMS 10 1.3
POLYALPHABETIC AND OTHER SYSTEMS 22 1.4 ROTORS AND DES 39 CHAPTER 2. THE
IDEA OF PUBLIC KEYS 55 2.1 SOME STREETS ARE ONE-WAY 55 2.2 HOW TO
REALIZE THE IDEA 64 2.3 OBVIOUS ADVANTAGES OF PUBLIC KEYS 71 CHAPTER 3.
KNAPSACK SYSTEMS 77 3.1 A TRAPDOOR IS BUILT 77 3.2 HOW TO FIND THE
TRAPDOOR 87 3.3 THEORY OF REACHABILITY 96 3.4 TRYING TO HIDE THE
TRAPDOOR AGAIN 108 3.5 DENSE KNAPSACKS 117 CHAPTER 4. RSA 125 4.1 LEGAL
WORLD 125 4.2 ATTACK AND DEFENSE 134 4.3 PRIMALITY 137 4.4 CRYPTANALYSIS
AND FACTORING 143 4.5 PARTIAL INFORMATION ON RSA 147 4.6 DISCRETE
LOGARITHMS AND KEY EXCHANGE 154 CHAPTER 5. OTHER BASES OF CRYPTOSYSTEMS
159 5.1 EXPONENTIATION IN QUADRATIC FIELDS 159 5.2 ITERATION OF
MORPHISMS 166 5.3 AUTOMATA AND LANGUAGE THEORY 174 5.4 CODING THEORY .
178 CHAPTER 6. CRYPTOGRAPHIC PROTOCOLS: SURPRISING VISTAS FOR
COMMUNICATION 18 1 6.1 MORE THAN ETIQUETTE 181 6.2 COIN FLIPPING BY
TELEPHONE. POKER REVISITED 184 6.3 HOW TO SHARE A SECRET 187 6.4 PARTIAL
DISCLOSURE OF SECRETS 190 6.5 OBLIVIOUS TRANSFER 194 6.6 APPLICATIONS:
BANKING AND BALLOTS 200 7 X CONTENTS 6.7 CONVINCING PROOFS WITH NO
DETAILS 202 6.8 ZERO-KNOWLEDGE PROOFS 208 6.9 ZERO-KNOWLEDGE PROOFS OF
IDENTITY 213 6.10 SECRET BALLOTING SYSTEMS REVISITED 218 6.11
CRYPTOGRAPHIC PROTOCOLS WITHOUT COMPUTERS 234 APPENDIX A. TUTORIAL IN
COMPLEXITY THEORY 245 APPENDIX B. TUTORIAL IN NUMBER THEORY 249 PROBLEMS
255 HISTORICAL AND BIBLIOGRAPHICAL REMARKS 263 REFERENCES 265 INDEX 269 |
any_adam_object | 1 |
author | Salomaa, Arto 1934- |
author_GND | (DE-588)121031764 |
author_facet | Salomaa, Arto 1934- |
author_role | aut |
author_sort | Salomaa, Arto 1934- |
author_variant | a s as |
building | Verbundindex |
bvnumber | BV010896979 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 273 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)833014413 (DE-599)BVBBV010896979 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | Second, enlarged edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV010896979</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240616</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">960805s1996 gw a||| |||| 00||| ger d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">96031537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540613560</subfield><subfield code="c">Pp. : DM 68.00</subfield><subfield code="9">3-540-61356-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)833014413</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV010896979</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-M158</subfield><subfield code="a">DE-526</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Salomaa, Arto</subfield><subfield code="d">1934-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121031764</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public key cryptography</subfield><subfield code="c">Arto Salomaa</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Public-key cryptography</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second, enlarged edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin; Heidelberg; New York; Barcelona; Budapest; Hong Kong; London; Milán; París; Santa Clara; Singapur; Tokio</subfield><subfield code="b">Springer</subfield><subfield code="c">1996</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 271 Seiten</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Texts in theoretical computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computabilidade e modelos de computacao</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007287771</subfield></datafield></record></collection> |
id | DE-604.BV010896979 |
illustrated | Illustrated |
indexdate | 2024-10-21T12:06:25Z |
institution | BVB |
isbn | 3540613560 |
language | German |
lccn | 96031537 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007287771 |
oclc_num | 833014413 |
open_access_boolean | |
owner | DE-29T DE-384 DE-20 DE-739 DE-91 DE-BY-TUM DE-91G DE-BY-TUM DE-703 DE-M347 DE-355 DE-BY-UBR DE-92 DE-19 DE-BY-UBM DE-1046 DE-M158 DE-526 DE-83 DE-11 DE-706 |
owner_facet | DE-29T DE-384 DE-20 DE-739 DE-91 DE-BY-TUM DE-91G DE-BY-TUM DE-703 DE-M347 DE-355 DE-BY-UBR DE-92 DE-19 DE-BY-UBM DE-1046 DE-M158 DE-526 DE-83 DE-11 DE-706 |
physical | X, 271 Seiten Ill. |
publishDate | 1996 |
publishDateSearch | 1996 |
publishDateSort | 1996 |
publisher | Springer |
record_format | marc |
series2 | Texts in theoretical computer science |
spelling | Salomaa, Arto 1934- Verfasser (DE-588)121031764 aut Public key cryptography Arto Salomaa Public-key cryptography Second, enlarged edition Berlin; Heidelberg; New York; Barcelona; Budapest; Hong Kong; London; Milán; París; Santa Clara; Singapur; Tokio Springer 1996 X, 271 Seiten Ill. txt rdacontent n rdamedia nc rdacarrier Texts in theoretical computer science Computabilidade e modelos de computacao larpcal Cryptographie Geheimschrift gtt Ordinateurs - Accès - Contrôle Computers Access control Public key cryptography Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Computer (DE-588)4070083-5 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 s DE-604 Computer (DE-588)4070083-5 s Zugriffskontrolle (DE-588)4293034-0 s Kryptologie (DE-588)4033329-2 s Software (DE-588)4055382-6 s HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Salomaa, Arto 1934- Public key cryptography Computabilidade e modelos de computacao larpcal Cryptographie Geheimschrift gtt Ordinateurs - Accès - Contrôle Computers Access control Public key cryptography Zugriffskontrolle (DE-588)4293034-0 gnd Computer (DE-588)4070083-5 gnd Software (DE-588)4055382-6 gnd Kryptologie (DE-588)4033329-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4070083-5 (DE-588)4055382-6 (DE-588)4033329-2 (DE-588)4209133-0 |
title | Public key cryptography |
title_alt | Public-key cryptography |
title_auth | Public key cryptography |
title_exact_search | Public key cryptography |
title_full | Public key cryptography Arto Salomaa |
title_fullStr | Public key cryptography Arto Salomaa |
title_full_unstemmed | Public key cryptography Arto Salomaa |
title_short | Public key cryptography |
title_sort | public key cryptography |
topic | Computabilidade e modelos de computacao larpcal Cryptographie Geheimschrift gtt Ordinateurs - Accès - Contrôle Computers Access control Public key cryptography Zugriffskontrolle (DE-588)4293034-0 gnd Computer (DE-588)4070083-5 gnd Software (DE-588)4055382-6 gnd Kryptologie (DE-588)4033329-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Computabilidade e modelos de computacao Cryptographie Geheimschrift Ordinateurs - Accès - Contrôle Computers Access control Public key cryptography Zugriffskontrolle Computer Software Kryptologie Public-Key-Kryptosystem |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT salomaaarto publickeycryptography |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis