Handbook of applied cryptography:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, Fla. [u.a.]
CRC Press
1997
|
Ausgabe: | Rev. reprint with updates |
Schriftenreihe: | CRC Press series on discrete mathematics and its applications
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXVIII, 780 S. Ill., graph. Darst. |
ISBN: | 0849385237 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013098219 | ||
003 | DE-604 | ||
005 | 20210122 | ||
007 | t | ||
008 | 000406s1997 xxuad|| |||| 00||| eng d | ||
020 | |a 0849385237 |9 0-8493-8523-7 | ||
035 | |a (OCoLC)288962730 | ||
035 | |a (DE-599)BVBBV013098219 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-20 |a DE-M347 |a DE-898 |a DE-355 |a DE-703 |a DE-739 |a DE-91G |a DE-384 |a DE-29T |a DE-92 |a DE-Aug4 |a DE-473 |a DE-1051 |a DE-521 |a DE-523 |a DE-634 |a DE-83 |a DE-11 |a DE-188 | ||
050 | 0 | |a QA76.9.A25M463 1997 | |
082 | 0 | |a 005.8/2 20 | |
082 | 0 | |a 005.8/2 |2 20 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 94A60 |2 msc | ||
084 | |a DAT 465b |2 stub | ||
100 | 1 | |a Menezes, Alfred J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Handbook of applied cryptography |c Alfred J. Menezes ; Paul C. van Oorschot ; Scott A. Vanstone |
246 | 1 | 3 | |a Applied cryptography |
250 | |a Rev. reprint with updates | ||
264 | 1 | |a Boca Raton, Fla. [u.a.] |b CRC Press |c 1997 | |
300 | |a XXVIII, 780 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a CRC Press series on discrete mathematics and its applications | |
650 | 4 | |a Authentification | |
650 | 4 | |a Cryptographie | |
650 | 4 | |a Cryptographie à clé publique | |
650 | 7 | |a Cryptographie |2 ram | |
650 | 4 | |a Ordinateurs - Accès - Contrôle | |
650 | 7 | |a Ordinateurs - Accès - Contrôle |2 ram | |
650 | 7 | |a RSA |2 inriac | |
650 | 7 | |a authentification |2 inriac | |
650 | 7 | |a clé accès |2 inriac | |
650 | 7 | |a cryptographie |2 inriac | |
650 | 7 | |a identification |2 inriac | |
650 | 7 | |a signature numérique |2 inriac | |
650 | 4 | |a Computers -- Access control -- Handbooks, manuals, etc | |
650 | 4 | |a Cryptography -- Handbooks, manuals, etc | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Oorschot, Paul C. van |e Verfasser |4 aut | |
700 | 1 | |a Vanstone, Scott A. |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-429-46633-5 |
856 | 4 | 2 | |m HEBIS Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008921879&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-008921879 |
Datensatz im Suchindex
_version_ | 1813525084149645312 |
---|---|
adam_text |
HANDBOOK of
AlfredJ Menezes
Paul C van Oorschot
ScottA Vanstone
CRC Press
Boca Raton London New York Washington, D C
Table of Contents
List of Tables xv
List of Figures xix
Foreword by R L Rivest xxi
Preface xxiii
1 Overview of Cryptography 1
1 1 Introduction 1
1 2 Information security and cryptography 2
1 3 Background on functions 6
131 Functions (1-1, one-way, trapdoor one-way) 6
132 Permutations 10
133 Involutions 10
1 4 Basic terminology and concepts 11
1 5 Symmetric-key encryption 15
151 Overview of block ciphers and stream ciphers 15
152 Substitution ciphers and transposition ciphers 17
153 Composition of ciphers 19
154 Stream ciphers 20
155 The key space 21
1 6 Digital signatures 22
1 7 Authentication and identification 24
171 Identification 24
172 Data origin authentication 25
1 8 Public-key cryptography 25
181 Public-key encryption 25
182 The necessity of authentication in public-key systems 27
183 Digital signatures from reversible public-key encryption 28
184 Symmetric-key vs public-key cryptography 31
1 9 Hash functions 33
1 10 Protocols and mechanisms 33
1 11 Key establishment, management, and certification 35
1 11 1 Key management through symmetric-key techniques 36
1 11 2 Key management through public-key techniques 37
1 11 3 Trusted third parties and public-key certificates 39
1 12 Pseudorandom numbers and sequences 39
1 13 Classes of attacks and security models 41
1 13 1 Attacks on encryption schemes 41
1 13 2 Attacks on protocols 42
1 13 3 Models for evaluating security 42
1 13 4 Perspective for computational security 44
1 14 Notes and further references 45
v
VI
Table of Contents
2 Mathematical Background 49
2 1 Probability theory 50
211 Basic definitions 50
212 Conditional probability 51
213 Random variables 51
214 Binomial distribution 52
215 Birthday problems 53
216 Random mappings 54
2 2 Information theory 56
221 Entropy 56
222 Mutual information 57
2 3 Complexity theory 57
231 Basic definitions 57
232 Asymptotic notation 58
233 Complexity classes 59
234 Randomized algorithms 62
2 4 Number theory 63
241 The integers 63
242 Algorithms in Z 66
243 The integers modulo n 67
244 Algorithms in Zn 71
245 The Legendre and Jacobi symbols 72
246 Blum integers 74
2 5 Abstract algebra 75
251 Groups 75
252 Rings 76
253 Fields 77
254 Polynomial rings 78
255 Vector spaces 79
2 6 Finite fields 80
261 Basic properties 80
262 The Euclidean algorithm for polynomials 81
263 Arithmetic of polynomials 83
2 7 Notes and further references 85 3
3 Number-Theoretic Reference Problems 87
3 1 Introduction and overview 87
3 2 The integer factorization problem 89
321 Trial division 90
322 Pollard’s rho factoring algorithm 91
323 Pollard’s p — 1 factoring algorithm 92
324 Elliptic curve factoring 94
325 Random square factoring methods 94
326 Quadratic sieve factoring 95
327 Number field sieve factoring 98
3 3 The RSA problem 98
3 4 The quadratic residuosity problem 99
3 5 Computing square roots in Zn 99
351 Case (i): n prime 100
352 Case (ii): n composite 101
Table of Contents vii
3 6 The discrete logarithm problem 103
361 Exhaustive search 104
362 Baby-step giant-step algorithm 104
363 Pollard’s rho algorithm for logarithms 106
364 Pohlig-Hellman algorithm 107
365 Index-calculus algorithm 109
366 Discrete logarithm problem in subgroups of Z* 113
3 7 The Diffie-Hellman problem 113
3 8 Composite moduli 114
3 9 Computing individual bits 114
391 The discrete logarithm problem in Z* — individual bits 116
392 The RSA problem — individual bits 116
393 The Rabin problem — individual bits 117
3 10 The subset sum problem 117
3 10 1 The L3-lattice basis reduction algorithm 118
3 10 2 Solving subset sum problems of low density 120
3 10 3 Simultaneous diophantine approximation 121
3 11 Factoring polynomials over finite fields 122
3 11 1 Square-free factorization 123
3 11 2 Berlekamp’s Q-matrix algorithm 124
3 12 Notes and further references 125
4 Public-Key Parameters 133
4 1 Introduction 133
411 Approaches to generating large prime numbers 134
412 Distribution of prime numbers 134
4 2 Probabilistic primality tests 135
421 Fermat’s test 136
422 Solovay-Strassen test 137
423 Miller-Rabin test 138
424 Comparison: Fermat, Solovay-Strassen, and Miller-Rabin 140
4 3 (True) Primality tests 142
431 Testing Mersenne numbers 142
432 Primality testing using the factorization of n — 1 143
433 Jacobi sum test 144
434 Tests using elliptic curves 145
4 4 Prime number generation 145
441 Random search for probable primes 145
442 Strong primes 149
443 NIST method for generating DSA primes 150
444 Constructive techniques for provable primes 152
4 5 Irreducible polynomials over Zp 154
451 Irreducible polynomials 154
452 Irreducible trinomials 157
453 Primitive polynomials 157
4 6 Generators and elements of high order 160
461 Selecting a prime p and generator of Z* 164
4 7 Notes and further references 165
Table of Contents
viii
5 Pseudorandom Bits and Sequences 169
5 1 Introduction 169
511 Background and Classification 170
5 2 Random bit generation 171
5 3 Pseudorandom bit generation 173
531 ANSI X9 17 generator 173
532 FTPS 186 generator 174
5 4 Statistical tests 175
541 The normal and chi-square distributions 176
542 Hypothesis testing 179
543 Golomb’s randomness postulates 180
544 Five basic tests 181
545 Maurer’s universal statistical test 183
5 5 Cryptographically secure pseudorandom bit generation 185
551 RSA pseudorandom bit generator 185
552 Blum-Blum-Shub pseudorandom bit generator 186
5 6 Notes and further references 187
6 Stream Ciphers 191
6 1 Introduction 191
611 Classification 192
6 2 Feedback shift registers 195
621 Linear feedback shift registers 195
622 Linear complexity 198
623 Berlekamp-Massey algorithm 200
624 Nonlinear feedback shift registers 202
6 3 Stream ciphers based on LFSRs 203
631 Nonlinear combination generators 205
632 Nonlinear filter generators 208
633 Clock-controlled generators 209
6 4 Other stream ciphers 212
641 SEAL 213
6 5 Notes and further references 216 7
7 Block Ciphers 223
7 1 Introduction and overview 223
7 2 Background and general concepts 224
721 Introduction to block ciphers 224
722 Modes of operation 228
723 Exhaustive key search and multiple encryption 233
7 3 Classical ciphers and historical development 237
731 Transposition ciphers (background) 238
732 Substitution ciphers (background) 238
733 Polyalphabetic substitutions and Vigenere ciphers (historical) 241
734 Polyalphabetic cipher machines and rotors (historical) 242
735 Cryptanalysis of classical ciphers (historical) 245
7 4 DES 250
741 Product ciphers and Feistel ciphers 250
742 DES algorithm 252
743 DES properties and strength 256
Table of Contents
ix
7 5 FEAL 259
7 6 IDEA 263
7 7 SAFER, RC5, and other block ciphers 266
771 SAFER 266
772 RC5 269
773 Other block ciphers 270
7 8 Notes and further references 271
8 Public-Key Encryption 283
8 1 Introduction 283
811 Basic principles 284
8 2 RSA public-key encryption 285
821 Description 286
822 Security of RS A 287
823 RSA encryption in practice 290
8 3 Rabin public-key encryption 292
8 4 ElGamal public-key encryption 294
841 Basic ElGamal encryption 294
842 Generalized ElGamal encryption 297
8 5 McEliece public-key encryption 298
8 6 Knapsack public-key encryption 300
861 Merkle-Hellman knapsack encryption 300
862 Chor-Rivest knapsack encryption 302
8 7 Probabilistic public-key encryption 306
871 Goldwasser-Micali probabilistic encryption 307
872 Blum-Goldwasser probabilistic encryption 308
873 Plaintext-aware encryption 311
8 8 Notes and further references 312
9 Hash Functions and Data Integrity 321
9 1 Introduction 321
9 2 Classification and framework 322
921 General classification 322
922 Basic properties and definitions 323
923 Hash properties required for specific applications 327
924 One-way functions and compression functions 327
925 Relationships between properties 329
926 Other hash function properties and applications 330
9 3 Basic constructions and general results 332
931 General model for iterated hash functions 332
932 General constructions and extensions 333
933 Formatting and initialization details 334
934 Security objectives and basic attacks 335
935 Bitsizes required for practical security 337
9 4 Unkeyed hash functions (MDCs) 338
941 Hash functions based on block ciphers 338
942 Customized hash functions based on MD4 343
943 Hash functions based on modular arithmetic 351
9 5 Keyed hash functions (MACs) 352
951 MACs based on block ciphers 353
X
Table of Contents
952 Constructing MACs from MDCs 354
953 Customized MACs 356
954 MACs for stream ciphers 358
9 6 Data integrity and message authentication 359
961 Background and definitions 359
962 Non-malicious vs malicious threats to data integrity 362
963 Data integrity using a MAC alone 364
964 Data integrity using an MDC and an authentic channel 364
965 Data integrity combined with encryption 364
9 7 Advanced attacks on hash functions 368
971 Birthday attacks 369
972 Pseudo-collisions and compression function attacks 371
973 Chaining attacks 373
974 Attacks based on properties of underlying cipher 375
9 8 Notes and further references 376
10 Identification and Entity Authentication 385
10 1 Introduction 385
10 1 1 Identification objectives and applications 386
10 1 2 Properties of identification protocols 387
10 2 Passwords (weak authentication) 388
10 2 1 Fixed password schemes: techniques 389
10 2 2 Fixed password schemes: attacks 391
10 2 3 Case study - UNIX passwords 393
10 2 4 PINs and passkeys 394
10 2 5 One-time passwords (towards strong authentication) 395
10 3 Challenge-response identification (strong authentication) 397
10 3 1 Background on time-variant parameters 397
10 3 2 Challenge-response by symmetric-key techniques 400
10 3 3 Challenge-response by public-key techniques 403
10 4 Customized and zero-knowledge identification protocols 405
10 4 1 Overview of zero-knowledge concepts 405
10 4 2 Feige-Fiat-Shamir identification protocol 410
10 4 3 GQ identification protocol 412
10 4 4 Schnorr identification protocol 414
10 4 5 Comparison: Fiat-Shamir, GQ, and Schnorr 416
10 5 Attacks on identification protocols 417
10 6 Notes and further references 420
11 Digital Signatures 425
11 1 Introduction 425
11 2 A framework for digital signature mechanisms 426
11 2 1 Basic definitions 426
11 2 2 Digital signature schemes with appendix 428
11 2 3 Digital signature schemes with message recovery 430
11 2 4 Types of attacks on signature schemes 432
11 3 RSA and related signature schemes 433
11 3 1 The RSA signature scheme 433
11 3 2 Possible attacks on RSA signatures 434
11 3 3 RSA signatures in practice 435
Table of Contents
XI
11 3 4 The Rabin public-key signature scheme 438
11 3 5 ISO/IEC 9796 formatting 442
11 3 6 PKCS#1 formatting 445
11 4 Fiat-Shamir signature schemes 447
11 4 1 Feige-Fiat-Shamir signature scheme 447
11 4 2 GQ signature scheme 450
11 5 The DSA and related signature schemes 451
11 5 1 The Digital Signature Algorithm (DSA) 452
11 5 2 The ElGamal signature scheme 454
11 5 3 The Schnorr signature scheme 459
11 5 4 The ElGamal signature scheme with message recovery 460
11 6 One-time digital signatures 462
11 6 1 The Rabin one-time signature scheme 462
11 6 2 The Merkle one-time signature scheme 464
11 6 3 Authentication trees and one-time signatures 466
11 6 4 The GMR one-time signature scheme 468
11 7 Other signature schemes 471
11 7 1 Arbitrated digital signatures 472
11 7 2 ESIGN 473
11 8 Signatures with additional functionality 474
11 8 1 Blind signature schemes 475
11 8 2 Undeniable signature schemes 476
11 8 3 Fail-stop signature schemes 478
11 9 Notes and further references 481
12 Key Establishment Protocols 489
12 1 Introduction 489
12 2 Classification and framework 490
12 2 1 General classification and fundamental concepts 490
12 2 2 Objectives and properties 493
12 2 3 Assumptions and adversaries in key establishment protocols 495
12 3 Key transport based on symmetric encryption 497
12 3 1 Symmetric key transport and derivation without a server 497
12 3 2 Kerberos and related server-based protocols 500
12 4 Key agreement based on symmetric techniques 505
12 5 Key transport based on public-key encryption 506
12 5 1 Key transport using PK encryption without signatures 507
12 5 2 Protocols combining PK encryption and signatures 509
12 5 3 Hybrid key transport protocols using PK encryption 512
12 6 Key agreement based on asymmetric techniques 515
12 6 1 Diffie-Hellman and related key agreement protocols 515
12 6 2 Implicitly-certified public keys 520
12 6 3 Diffie-Hellman protocols using implicitly-certified keys 522
12 7 Secret sharing 524
12 7 1 Simple shared control schemes 524
12 7 2 Threshold schemes 525
12 7 3 Generalized secret sharing 526
12 8 Conference keying 528
12 9 Analysis of key establishment protocols 530
12 9 1 Attack strategies and classic protocol flaws 530
XII
Table of Contents
12 9 2 Analysis objectives and methods 532
12 10 Notes and further references 534
13 Key Management Techniques 543
13 1 Introduction 543
13 2 Background and basic concepts 544
13 2 1 Classifying keys by algorithm type and intended use 544
13 2 2 Key management objectives, threats, and policy 545
13 2 3 Simple key establishment models 546
13 2 4 Roles of third parties 547
13 2 5 Tradeoffs among key establishment protocols 550
13 3 Techniques for distributing confidential keys 551
13 3 1 Key layering and cryptoperiods 551
13 3 2 Key translation centers and symmetric-key certificates 553
13 4 Techniques for distributing public keys 555
13 4 1 Authentication trees 556
13 4 2 Public-key certificates 559
13 4 3 Identity-based systems 561
13 4 4 Implicitly-certified public keys 562
13 4 5 Comparison of techniques for distributing public keys 563
13 5 Techniques for controlling key usage 567
13 5 1 Key separation and constraints on key usage 567
13 5 2 Techniques for controlling use of symmetric keys 568
13 6 Key management involving multiple domains 570
13 6 1 Trust between two domains 570
13 6 2 Trust models involving multiple certification authorities 572 i
13 6 3 Certificate distribution and revocation 576
13 7 Key life cycle issues 577 !
13 7 1 Lifetime protection requirements 578 j
13 7 2 Key management life cycle 578 [
13 8 Advanced trusted third party services 581
13 8 1 Trusted timestamping service 581
13 8 2 Non-repudiation and notarization of digital signatures 582
13 8 3 Key escrow 584 J
13 9 Notes and further references 586 l
14 Efficient Implementation 591 l
14 1 Introduction 591 [
14 2 Multiple-precision integer arithmetic 592
14 2 1 Radix representation 592
14 2 2 Addition and subtraction 594 f
14 2 3 Multiplication 595 I
14 2 4 Squaring 596 f
14 2 5 Division 598 f
14 3 Multiple-precision modular arithmetic 599 |
14 3 1 Classical modular multiplication 600 f
14 3 2 Montgomery reduction 600 j
14 3 3 Barrett reduction 603 f
14 3 4 Reduction methods for moduli of special form 605 |
14 4 Greatest common divisor algorithms 606 I
Table of Contents
xiii
14 4 1 Binary gcd algorithm 606
14 4 2 Lehmer’s gcd algorithm 607
14 4 3 Binary extended gcd algorithm 608
14 5 Chinese remainder theorem for integers 610
14 5 1 Residue number systems 611
14 5 2 Gamer’s algorithm 612
14 6 Exponentiation 613
14 6 1 Techniques for general exponentiation 614
14 6 2 Fixed-exponent exponentiation algorithms 620
14 6 3 Fixed-base exponentiation algorithms 623
14 7 Exponent recoding 627
14 7 1 Signed-digit representation 627
14 7 2 String-replacement representation 628
14 8 Notes and further references 630
15 Patents and Standards 635
15 1 Introduction 635
15 2 Patents on cryptographic techniques 635
15 2 1 Five fundamental patents 636
15 2 2 Ten prominent patents 638
15 2 3 Ten selected patents 641
15 2 4 Ordering and acquiring patents 645
15 3 Cryptographic standards 645
15 3 1 International standards - cryptographic techniques 645
15 3 2 Banking security standards (ANSI, ISO) 648
15 3 3 International security architectures and frameworks 653
15 34US government standards (FIPS) 654
15 3 5 Internet standards and RFCs 655
15 3 6 De facto standards 656
15 3 7 Ordering and acquiring standards 656
15 4 Notes and further references 657
A Bibliography of Papers from Selected Cryptographic Forums 663
A 1 Asiacrypt/Auscrypt Proceedings 663
A 2 Crypto Proceedings 667
A 3 Eurocrypt Proceedings 684
A 4 Fast Software Encryption Proceedings 698
A 5 Journal of Cryptology papers 700
References 703 |
any_adam_object | 1 |
author | Menezes, Alfred J. Oorschot, Paul C. van Vanstone, Scott A. |
author_facet | Menezes, Alfred J. Oorschot, Paul C. van Vanstone, Scott A. |
author_role | aut aut aut |
author_sort | Menezes, Alfred J. |
author_variant | a j m aj ajm p c v o pcv pcvo s a v sa sav |
building | Verbundindex |
bvnumber | BV013098219 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25M463 1997 |
callnumber-search | QA76.9.A25M463 1997 |
callnumber-sort | QA 276.9 A25 M463 41997 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 273 ST 276 |
classification_tum | DAT 465b |
ctrlnum | (OCoLC)288962730 (DE-599)BVBBV013098219 |
dewey-full | 005.8/220 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 20 005.8/2 |
dewey-search | 005.8/2 20 005.8/2 |
dewey-sort | 15.8 12 220 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | Rev. reprint with updates |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV013098219</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210122</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">000406s1997 xxuad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0849385237</subfield><subfield code="9">0-8493-8523-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)288962730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013098219</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25M463 1997</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2 20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465b</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Menezes, Alfred J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of applied cryptography</subfield><subfield code="c">Alfred J. Menezes ; Paul C. van Oorschot ; Scott A. Vanstone</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Applied cryptography</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Rev. reprint with updates</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Fla. [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">1997</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVIII, 780 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">CRC Press series on discrete mathematics and its applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie à clé publique</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ordinateurs - Accès - Contrôle</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">RSA</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">authentification</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">clé accès</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">identification</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">signature numérique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers -- Access control -- Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography -- Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oorschot, Paul C. van</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vanstone, Scott A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-429-46633-5</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008921879&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008921879</subfield></datafield></record></collection> |
id | DE-604.BV013098219 |
illustrated | Illustrated |
indexdate | 2024-10-21T12:04:54Z |
institution | BVB |
isbn | 0849385237 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008921879 |
oclc_num | 288962730 |
open_access_boolean | |
owner | DE-20 DE-M347 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-703 DE-739 DE-91G DE-BY-TUM DE-384 DE-29T DE-92 DE-Aug4 DE-473 DE-BY-UBG DE-1051 DE-521 DE-523 DE-634 DE-83 DE-11 DE-188 |
owner_facet | DE-20 DE-M347 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-703 DE-739 DE-91G DE-BY-TUM DE-384 DE-29T DE-92 DE-Aug4 DE-473 DE-BY-UBG DE-1051 DE-521 DE-523 DE-634 DE-83 DE-11 DE-188 |
physical | XXVIII, 780 S. Ill., graph. Darst. |
publishDate | 1997 |
publishDateSearch | 1997 |
publishDateSort | 1997 |
publisher | CRC Press |
record_format | marc |
series2 | CRC Press series on discrete mathematics and its applications |
spelling | Menezes, Alfred J. Verfasser aut Handbook of applied cryptography Alfred J. Menezes ; Paul C. van Oorschot ; Scott A. Vanstone Applied cryptography Rev. reprint with updates Boca Raton, Fla. [u.a.] CRC Press 1997 XXVIII, 780 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier CRC Press series on discrete mathematics and its applications Authentification Cryptographie Cryptographie à clé publique Cryptographie ram Ordinateurs - Accès - Contrôle Ordinateurs - Accès - Contrôle ram RSA inriac authentification inriac clé accès inriac cryptographie inriac identification inriac signature numérique inriac Computers -- Access control -- Handbooks, manuals, etc Cryptography -- Handbooks, manuals, etc Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Zugriffskontrolle (DE-588)4293034-0 s DE-604 1\p DE-604 Oorschot, Paul C. van Verfasser aut Vanstone, Scott A. Verfasser aut Erscheint auch als Online-Ausgabe 978-0-429-46633-5 HEBIS Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008921879&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Menezes, Alfred J. Oorschot, Paul C. van Vanstone, Scott A. Handbook of applied cryptography Authentification Cryptographie Cryptographie à clé publique Cryptographie ram Ordinateurs - Accès - Contrôle Ordinateurs - Accès - Contrôle ram RSA inriac authentification inriac clé accès inriac cryptographie inriac identification inriac signature numérique inriac Computers -- Access control -- Handbooks, manuals, etc Cryptography -- Handbooks, manuals, etc Zugriffskontrolle (DE-588)4293034-0 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4033329-2 |
title | Handbook of applied cryptography |
title_alt | Applied cryptography |
title_auth | Handbook of applied cryptography |
title_exact_search | Handbook of applied cryptography |
title_full | Handbook of applied cryptography Alfred J. Menezes ; Paul C. van Oorschot ; Scott A. Vanstone |
title_fullStr | Handbook of applied cryptography Alfred J. Menezes ; Paul C. van Oorschot ; Scott A. Vanstone |
title_full_unstemmed | Handbook of applied cryptography Alfred J. Menezes ; Paul C. van Oorschot ; Scott A. Vanstone |
title_short | Handbook of applied cryptography |
title_sort | handbook of applied cryptography |
topic | Authentification Cryptographie Cryptographie à clé publique Cryptographie ram Ordinateurs - Accès - Contrôle Ordinateurs - Accès - Contrôle ram RSA inriac authentification inriac clé accès inriac cryptographie inriac identification inriac signature numérique inriac Computers -- Access control -- Handbooks, manuals, etc Cryptography -- Handbooks, manuals, etc Zugriffskontrolle (DE-588)4293034-0 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Authentification Cryptographie Cryptographie à clé publique Ordinateurs - Accès - Contrôle RSA authentification clé accès cryptographie identification signature numérique Computers -- Access control -- Handbooks, manuals, etc Cryptography -- Handbooks, manuals, etc Zugriffskontrolle Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008921879&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT menezesalfredj handbookofappliedcryptography AT oorschotpaulcvan handbookofappliedcryptography AT vanstonescotta handbookofappliedcryptography AT menezesalfredj appliedcryptography AT oorschotpaulcvan appliedcryptography AT vanstonescotta appliedcryptography |