Introduction to cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
Springer
2004
|
Ausgabe: | 2. ed. |
Schriftenreihe: | Undergraduate texts in mathematics
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVI, 335 S. graph. Darst. |
ISBN: | 038721156X 9780387211565 0387207562 9780387207568 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV017721234 | ||
003 | DE-604 | ||
005 | 20180502 | ||
007 | t | ||
008 | 031210s2004 d||| |||| 00||| eng d | ||
016 | 7 | |a 969441673 |2 DE-101 | |
020 | |a 038721156X |c hbk |9 0-387-21156-X | ||
020 | |a 9780387211565 |c hbk |9 978-0-387-21156-5 | ||
020 | |a 0387207562 |c pbk |9 0-387-20756-2 | ||
020 | |a 9780387207568 |c pbk |9 978-0-387-20756-8 | ||
035 | |a (OCoLC)890366340 | ||
035 | |a (DE-599)BVBBV017721234 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-355 |a DE-91G |a DE-20 |a DE-19 |a DE-1051 |a DE-634 |a DE-83 |a DE-11 |a DE-521 |a DE-188 |a DE-739 | ||
050 | 0 | |a QA268 | |
082 | 0 | |a 003/.54 |2 22 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 94A60 |2 msc | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Buchmann, Johannes |d 1953- |e Verfasser |0 (DE-588)105019178 |4 aut | |
245 | 1 | 0 | |a Introduction to cryptography |c Johannes Buchmann |
250 | |a 2. ed. | ||
264 | 1 | |a New York [u.a.] |b Springer |c 2004 | |
300 | |a XVI, 335 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Undergraduate texts in mathematics | |
650 | 4 | |a Codage | |
650 | 7 | |a Computabilidade e complexidade |2 larpcal | |
650 | 7 | |a Criptologia |2 larpcal | |
650 | 4 | |a Cryptographie | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
787 | 0 | 8 | |i Deutsche Ausg. u.d.T.: |a Buchmann, Johannes A. |t Einführung in die Kryptographie |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010652618&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010652618 |
Datensatz im Suchindex
_version_ | 1804130446455341057 |
---|---|
adam_text | Preface for the Second Edition xiii
Preface xv
1 Integers 1
1.1 Basics .... ... .... . .... ... ........... 1
1.2 Divisibility .... ... ... .... ... .... . . 3
1.3 Representation of Integers . . ............ 4
1.4 O-and £2-Notation . . . ........ ..... ... 6
1.5 Cost of Addition, Multiplication, and Division with
Remainder . . . ......... ... V . . .... . 7
1.6 Polynomial Time . . . . . . . . . . . . . • • • . . . 9
1.7 Greatest Common Divisor . . . . . . . . . . . i 9
1.8 Euclidean Algorithm ................. 12
1.9 Extended Euclidean Algorithm . . .... ...... 16
1.10 Analysis of the Extended Euclidean Algorithm . . .18
1.11 Factoring into Primes . . . . . . . . ... . . , . . . 22
1.12 Exercises ..... ................... 24
2 Congruences and Residue Class Rings 29
2.1 Congruences . . . . . .......... . . . .... 29
VÜ
yj|j Con
2.2 Semigroups . . . .... . . . . . . . . . ...
2.3 Groups ... . ... .... . . ... ...........
2.4 Residue Class Ring . . . . . . . . . . . .... . .
2.5 Fields ... . ..... . . . . . . . . . . ..
2.6 Division in the Residue Class Ring ..........
2.7 Analysis of the Operations in the Residue Class Ring
2.8 Multiplicative Group of Residues mod m ......
2.9 Order of Group Elements . . . . . . ... . ... . .
2.10 Subgroups ... ...... ... .... . ... . .
2.11 Fermat s Little Theorem . . . . ...........
2.12 Fast Exponentiation . . . . . . . . . . ... . . . . .
2.13 Fast Evaluation of Power Products ..........
2.14 Computation of Element Orders . . .........
2.15 The Chinese Remainder Theorem ...................
2.16 Decomposition of the Residue Class Ring . . . . . .
2.17 A Formula for the Euler yi-Function....... .
2.18 Polynomials ........ . ..........................
2.19 Polynomials over Fields ... .............
2.20 Construction of Finite Fields .... .........
2.21 The Structure of the Unit Group of Finite Fields . .
2.22 Structure of the Multiplicative Group of Residues
Modulo a Prime Number . • • • • ........ . .
2.23 Exercises .......... . . . ... ........
32
34
35
36
36
38
39
41
42
44
45
48
49
51
53
55
56
58
61
65
66
67
3 Encryption 71
3.1 Encryption Schemes . V . . . . . . . . . ............. 71
3.2 Symmetric and Asymmetric Cryptosystems . ... 73
3.3 Cryptanalysis ........ ..... . .... ... 74
3.4 Alphabets and Words . . . . . . . . . . ...... 77
3.5 Permutations . . . ....... ... ......... 80
3.6 Block Ciphers . . . .. ..... . .... . . . . . . . 81
3.7 Multiple Encryption . .... . . . . . . . ...... 82
3.8 The Use of Block Ciphers . . . .... . . ...... 83
3.9 Stream Ciphers .... . . . . ... ...................... 93
3.10 The Affine Cipher .... .............................. 95
3.11 Matrices and Linear Maps . . . . . . . ............... 97
3.12 Affine Linear Block Ciphers . ...................... 102
3.13 Vigenere, Hill, and Permutation Ciphers.... 103
Contents
3.14 Cryptanalysis of Affine Linear Block Ciphers . . . 104
3.15 Secure Cryptosystems . . . ..... • • • • • • • • • 105
3.16 Exercises . . . ........ ........ . . ... Ill
4 Probability and Perfect Secrecy 115
4.1 Probability . ... . . . . 9 4 ♦ *. * . • « 4 4 . 4 » • 9 9- 9 115
4.2 Conditional Probability . • • » • * « ♦ 9 9 .4 • • . 4 4 „ 9 9 117
4.3 Birthday Paradox . . . . . 4 4 • 4 8 • - » 4 4.4.4 4, 4. 4 4 118
4.4 Perfect Secrecy . ... . . 119
4.5 Vemam One-Time Pad . • 4 • • 4 4 • 4 4- 4 . 4 4 4 4 -4 123
4.6 Random Numbers . . . . -4 -4. * 4 4 .4 4 4 124
4.7 Pseudorandom Numbers • * ♦ « « • • 4 .4 . 4 4 .4 4 4 4 124
4.8 Exercises . ...... . . m • * • • • 9 * « • 4’ 4 4- 9 4 . 4 4 125
DES 127
5.1 Feistel Ciphers ...... • • • • 4 4 * . • ‘ •- 4 -4 . 4 4 4 9 4 127
5.2 DES Algorithm . . . . . . • 4 4 4 4 » « • 4 4 4- . 4 4- 4 - 4 4. 128
5.3 An Example- ... . . • « « 4 • V ♦. * .4 4 4 4 . 4 - • 4 .4 134
5.4 Security of DES . . . . . m ♦ 4.« • * 4 9 4 4 4 4 . ‘ 4 4 . 136
5.5 Exercises......... . . . . 137
AES 139
6.1 Notation ......... 139
6.2 Cipher . . . . . . .... • « ■ ♦ .4 4 • - • 4‘ 4* 4 » 4 • 4 • 4 ♦ 140
6.3 KeyExpansion . . 4 9 4 : 4 4 4 4 . 9 • - 4 145
6.4 An Example . . . . . . . 146
6.5 InvCipher . ... . . . ... .♦ • ’’ ♦ . ♦ . • - .4 4 4 4 4 « 4 4 4’ 148
6.6 Exercises . . . . . ... . • .. 148
Prime Number Generation 151
7.1 THal Division . . .... . • 4.-9 9 9 .4 • 4 - - 4 4 . 4.4 4 . - 4 • 4 • 151
7.2 Fermât Ttest. . . . ... . • * 4 4.4 444 4 9 4 4 4 . . 4 . 9 . 4 153
7.3 Carmichael Numbers . . 154
7.4 Miller-Rabin Ibst . . . . . 156
7.5 Random Primes ... . 159
7.6 Exercises ......... 160
Contents
8 Public-Key Encryption 163
8.1 Idea........................... ..... . . . 163
8.2 Security ....... .... ... .......... . 165
8.3 RSA Cryptosystem . . ..... .... . . ...... 167
8.4 Rabin Encryption ............... . . . . 181
8.5 Diffie-Hellman Key Exchange . .... . . .... ... 186
8.6 ElGamal Encryption ........... . . . ... . 191
8.7 Exercises ........... ....... ...... 196
9 Factoring 199
9.1 Trial Division...... . ........... .... 199
9.2 p - 1 Method.... ... ... ... 200
9.3 Quadratic sieve ......... ..... . . . . . . 201
9.4 Analysis of the Quadratic Sieve . . . . .... . . . 206
9.5 Efficiency of Other Factoring Algorithms ...... 210
9.6 Exercises ..... ........ ... .................... . 211
10 Discrete Logarithms 213
10.1 The DL Problem....................... . . . ..... 213
10.2 Enumeration.................... ... .... . 214
10.3 Shanks Baby-Step Giant-Step Algorithm . .... . . 214
10.4 The Pollard p-Algorithm . .... .......... 217
10.5 The Pohlig-Hellman Algorithm . . .......... 221
10.6 Index Calculus ... . .... . . . ... . . . . . ... 226
10.7 Other Algorithms ... . ... . . . . . . . . . . . . 230
10.8 Generalization of the Index Calculus Algorithm . . 231
10.9 Exercises ... .......... ...... ... . . 232
11 Cryptographic Hash Functions 235
11.1 Hash Functions and Compression Functions . . . . 235
11.2 Birthday Attack . . . . ........ . . ... . . . 238
11.3 Compression Functions from Encryption Functions 239
11.4 Hash Functions from Compression Functions ... 239
11.5 SHA-1 ... . ....... . . . . . . . . . . .... . 242
11.6 Other Hash Functions . ... . . . . . ... ..... 244
11.7 An Arithmetic Compression Function . . . . . . . . 245
11.8 Message Authentication Codes . ......... . . 247
11.9 Exercises . . . . .... . . . . . . . . .... .... 248
Contents
12 Digital Signatures
12.1 Idea ........ .... ... . ...... . . . . .
12.2 Security.... . . . . ......... ..........
12.3 RSA Signatures . . . . . . . ... . . . . . . . . . .
12.4 Signatures from Public-Key Systems . . • . . • • • •
12.5 ElGamal Signature . . . .... . . . . . ... . . .
12.6 The Digital Signature Algorithm (DSA) . . . . .
12.7 Undeniable Signatures . . . . . .... .....;.
12.8 Blind Signatures . . . .......... . . . . . . .
12.9 Exercises ...... . . . . . . . . . . .... .
13 Other Systems
13.1 Finite Fields . . ... .... . . . . . . ...... .
13.2 Elliptic Curves . . . . ... . . . . . . . . . . . . .
13.3 Quadratic Forms..... . .. .. . .... ... .... . . .
13.4 Exercises ... . . . . . . ..............
14 Identification
14.1 Passwords . ... ..... . . . . . ........
14.2 One-Time Passwords . . . . . . . ...... . . . .
14.3 Challenge-Response Identification . ..... . . . .
14.4 Exercises . . . . ........ ............
15 Secret Sharing
15.1 The Principle ... . . ........ . . . . . . . .
15.2 The Shamir Secret Sharing Protocol . . . . . . .
15.3 Exercises .... . . .... . ... .......
16 Public-Key Infrastructures
16.1 Personal Security Environments ... . .... . . .
16.2 Certification Authorities . . . . ...........
16.3 Certificate Chains . . . . . . , . ..........
• - ■ . . ; ■ ■ ■ • ■ • • . O ..
Solutions of the exercises
References
Index
XI
249
249
250
251
257
257
263
266
271
274
277
278
278
282
283
285
286
287
287
292
293
293
294
297
299
299
301
306
307
325
331
|
any_adam_object | 1 |
author | Buchmann, Johannes 1953- |
author_GND | (DE-588)105019178 |
author_facet | Buchmann, Johannes 1953- |
author_role | aut |
author_sort | Buchmann, Johannes 1953- |
author_variant | j b jb |
building | Verbundindex |
bvnumber | BV017721234 |
callnumber-first | Q - Science |
callnumber-label | QA268 |
callnumber-raw | QA268 |
callnumber-search | QA268 |
callnumber-sort | QA 3268 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)890366340 (DE-599)BVBBV017721234 |
dewey-full | 003/.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003/.54 |
dewey-search | 003/.54 |
dewey-sort | 13 254 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02119nam a2200565 c 4500</leader><controlfield tag="001">BV017721234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180502 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">031210s2004 d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">969441673</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">038721156X</subfield><subfield code="c">hbk</subfield><subfield code="9">0-387-21156-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387211565</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-387-21156-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387207562</subfield><subfield code="c">pbk</subfield><subfield code="9">0-387-20756-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387207568</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-387-20756-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890366340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017721234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA268</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003/.54</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchmann, Johannes</subfield><subfield code="d">1953-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)105019178</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cryptography</subfield><subfield code="c">Johannes Buchmann</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 335 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Undergraduate texts in mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Codage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computabilidade e complexidade</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criptologia</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="787" ind1="0" ind2="8"><subfield code="i">Deutsche Ausg. u.d.T.:</subfield><subfield code="a">Buchmann, Johannes A.</subfield><subfield code="t">Einführung in die Kryptographie</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010652618&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010652618</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV017721234 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:21:10Z |
institution | BVB |
isbn | 038721156X 9780387211565 0387207562 9780387207568 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010652618 |
oclc_num | 890366340 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-91G DE-BY-TUM DE-20 DE-19 DE-BY-UBM DE-1051 DE-634 DE-83 DE-11 DE-521 DE-188 DE-739 |
owner_facet | DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-91G DE-BY-TUM DE-20 DE-19 DE-BY-UBM DE-1051 DE-634 DE-83 DE-11 DE-521 DE-188 DE-739 |
physical | XVI, 335 S. graph. Darst. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer |
record_format | marc |
series2 | Undergraduate texts in mathematics |
spelling | Buchmann, Johannes 1953- Verfasser (DE-588)105019178 aut Introduction to cryptography Johannes Buchmann 2. ed. New York [u.a.] Springer 2004 XVI, 335 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Undergraduate texts in mathematics Codage Computabilidade e complexidade larpcal Criptologia larpcal Cryptographie Geheimschrift gtt Coding theory Cryptography Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Deutsche Ausg. u.d.T.: Buchmann, Johannes A. Einführung in die Kryptographie Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010652618&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Buchmann, Johannes 1953- Introduction to cryptography Codage Computabilidade e complexidade larpcal Criptologia larpcal Cryptographie Geheimschrift gtt Coding theory Cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4123623-3 |
title | Introduction to cryptography |
title_auth | Introduction to cryptography |
title_exact_search | Introduction to cryptography |
title_full | Introduction to cryptography Johannes Buchmann |
title_fullStr | Introduction to cryptography Johannes Buchmann |
title_full_unstemmed | Introduction to cryptography Johannes Buchmann |
title_short | Introduction to cryptography |
title_sort | introduction to cryptography |
topic | Codage Computabilidade e complexidade larpcal Criptologia larpcal Cryptographie Geheimschrift gtt Coding theory Cryptography Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Codage Computabilidade e complexidade Criptologia Cryptographie Geheimschrift Coding theory Cryptography Kryptologie Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010652618&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT buchmannjohannes introductiontocryptography |