Encryption schemes for computer confidentiality:
With the ever-increasing amount of data stored on computers, the need for security in transmission becomes greater and greater. The author considers some new stream enciphering schemes based on J-K flip-flops. The data is considered to be a stream of binary bits. There are two main types of encipher...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge, Mass.
1975
|
Schriftenreihe: | MAC technical memorandum
63 |
Schlagworte: | |
Zusammenfassung: | With the ever-increasing amount of data stored on computers, the need for security in transmission becomes greater and greater. The author considers some new stream enciphering schemes based on J-K flip-flops. The data is considered to be a stream of binary bits. There are two main types of encipherment schemes; a block scheme and a stream scheme. Since the aim of this paper is to present some new stream enciphering schemes, the author describes briefly a general stream enciphering scheme. |
Beschreibung: | 19 S. |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV022136219 | ||
003 | DE-604 | ||
005 | 20230131 | ||
007 | t | ||
008 | 890125s1975 |||| 00||| eng d | ||
035 | |a (OCoLC)227385318 | ||
035 | |a (DE-599)BVBBV022136219 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
100 | 1 | |a Pless, Vera |d 1931-2020 |e Verfasser |0 (DE-588)133058247 |4 aut | |
245 | 1 | 0 | |a Encryption schemes for computer confidentiality |
264 | 1 | |a Cambridge, Mass. |c 1975 | |
300 | |a 19 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a MAC technical memorandum |v 63 | |
520 | 3 | |a With the ever-increasing amount of data stored on computers, the need for security in transmission becomes greater and greater. The author considers some new stream enciphering schemes based on J-K flip-flops. The data is considered to be a stream of binary bits. There are two main types of encipherment schemes; a block scheme and a stream scheme. Since the aim of this paper is to present some new stream enciphering schemes, the author describes briefly a general stream enciphering scheme. | |
650 | 7 | |a Coding |2 dtict | |
650 | 7 | |a Computations |2 dtict | |
650 | 7 | |a Computer Hardware |2 scgdst | |
650 | 7 | |a Computer Systems Management and Standards |2 scgdst | |
650 | 7 | |a Data processing security |2 dtict | |
650 | 7 | |a Shift registers |2 dtict | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
830 | 0 | |a MAC technical memorandum |v 63 |w (DE-604)BV008910218 |9 63 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-015350837 |
Datensatz im Suchindex
_version_ | 1804136108542394368 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Pless, Vera 1931-2020 |
author_GND | (DE-588)133058247 |
author_facet | Pless, Vera 1931-2020 |
author_role | aut |
author_sort | Pless, Vera 1931-2020 |
author_variant | v p vp |
building | Verbundindex |
bvnumber | BV022136219 |
ctrlnum | (OCoLC)227385318 (DE-599)BVBBV022136219 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01673nam a2200385zcb4500</leader><controlfield tag="001">BV022136219</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230131 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">890125s1975 |||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)227385318</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022136219</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pless, Vera</subfield><subfield code="d">1931-2020</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)133058247</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Encryption schemes for computer confidentiality</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Mass.</subfield><subfield code="c">1975</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">19 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">MAC technical memorandum</subfield><subfield code="v">63</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">With the ever-increasing amount of data stored on computers, the need for security in transmission becomes greater and greater. The author considers some new stream enciphering schemes based on J-K flip-flops. The data is considered to be a stream of binary bits. There are two main types of encipherment schemes; a block scheme and a stream scheme. Since the aim of this paper is to present some new stream enciphering schemes, the author describes briefly a general stream enciphering scheme.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coding</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computations</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Hardware</subfield><subfield code="2">scgdst</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Systems Management and Standards</subfield><subfield code="2">scgdst</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data processing security</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Shift registers</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">MAC technical memorandum</subfield><subfield code="v">63</subfield><subfield code="w">(DE-604)BV008910218</subfield><subfield code="9">63</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015350837</subfield></datafield></record></collection> |
id | DE-604.BV022136219 |
illustrated | Not Illustrated |
index_date | 2024-07-02T16:17:20Z |
indexdate | 2024-07-09T20:51:09Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015350837 |
oclc_num | 227385318 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 19 S. |
publishDate | 1975 |
publishDateSearch | 1975 |
publishDateSort | 1975 |
record_format | marc |
series | MAC technical memorandum |
series2 | MAC technical memorandum |
spelling | Pless, Vera 1931-2020 Verfasser (DE-588)133058247 aut Encryption schemes for computer confidentiality Cambridge, Mass. 1975 19 S. txt rdacontent n rdamedia nc rdacarrier MAC technical memorandum 63 With the ever-increasing amount of data stored on computers, the need for security in transmission becomes greater and greater. The author considers some new stream enciphering schemes based on J-K flip-flops. The data is considered to be a stream of binary bits. There are two main types of encipherment schemes; a block scheme and a stream scheme. Since the aim of this paper is to present some new stream enciphering schemes, the author describes briefly a general stream enciphering scheme. Coding dtict Computations dtict Computer Hardware scgdst Computer Systems Management and Standards scgdst Data processing security dtict Shift registers dtict Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 MAC technical memorandum 63 (DE-604)BV008910218 63 |
spellingShingle | Pless, Vera 1931-2020 Encryption schemes for computer confidentiality MAC technical memorandum Coding dtict Computations dtict Computer Hardware scgdst Computer Systems Management and Standards scgdst Data processing security dtict Shift registers dtict Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Encryption schemes for computer confidentiality |
title_auth | Encryption schemes for computer confidentiality |
title_exact_search | Encryption schemes for computer confidentiality |
title_exact_search_txtP | Encryption schemes for computer confidentiality |
title_full | Encryption schemes for computer confidentiality |
title_fullStr | Encryption schemes for computer confidentiality |
title_full_unstemmed | Encryption schemes for computer confidentiality |
title_short | Encryption schemes for computer confidentiality |
title_sort | encryption schemes for computer confidentiality |
topic | Coding dtict Computations dtict Computer Hardware scgdst Computer Systems Management and Standards scgdst Data processing security dtict Shift registers dtict Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Coding Computations Computer Hardware Computer Systems Management and Standards Data processing security Shift registers Kryptologie |
volume_link | (DE-604)BV008910218 |
work_keys_str_mv | AT plessvera encryptionschemesforcomputerconfidentiality |