Cryptography research perspectives:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hauppauge, NY
Nova Science Publishers
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | X, 257 S. graph. Darst. |
ISBN: | 9781604564921 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035079633 | ||
003 | DE-604 | ||
005 | 20091104 | ||
007 | t | ||
008 | 081001s2009 xxud||| |||| 00||| eng d | ||
010 | |a 2008013484 | ||
020 | |a 9781604564921 |c hardcover |9 978-1-60456-492-1 | ||
035 | |a (OCoLC)213445791 | ||
035 | |a (DE-599)BVBBV035079633 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-703 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
245 | 1 | 0 | |a Cryptography research perspectives |c Roland E. Chen, ed. |
264 | 1 | |a Hauppauge, NY |b Nova Science Publishers |c 2009 | |
300 | |a X, 257 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chen, Roland E. |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016747898&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016747898 |
Datensatz im Suchindex
_version_ | 1804138031243853824 |
---|---|
adam_text | Contents
Preface
Chapter
1
Chapter
2
Chapter
3
Chapter
4
Chapter
5
Chapter
6
Chapter
7
Chapter
8
Chapter
9
Chapter
10
Index
Constructive Codes for Classical and Quantum Wiretap Channels
Mitsunt Hamada
Concurrent Error Detection/Correction
in Finite Field Arithmetic Architectures over GF(2m)
Chiou-Yng Lee, PramodKumar Meher, Che Wun
Chiou
and
Jim-Min Lin
Fingerprint Based Encryption
Jie
Tian,
Peng Shi, Xin Yang, Zhe Wu, Peng Li and Liang Li
On the Properties of Stream Ciphers Based on Extremal Directed
Graphs
V. Ustimenko and J. Kotorowicz
Morpheus: A Word Oriented Stream Cipher
Nikos Komninos
On the Optimal Mean Photon Number for Quantum Cryptography
David S. Pearson and Chip Elliott
Real-World Evolutionary Designs: Secure Evolvable Hardware
for Public-Key Cryptosystems
Nadia
Nedjah and
Luiza
de Macedo Mourelle
Private and Public Key Systems Using Graphs of high Girth
Abderezak Touzene and Vasyl Ustimenko
High Performance for Cryptographic Hash Cores Implemented
in Hardware
Haralambos
Michail
and Athanasios P. Kakarountas
A Survey on Broadcast Encryption
Scott C.-H. Huang and
Ding-Zhu Du
Vil
1
49
97
125
143
157
177
205
217
233
249
|
adam_txt |
Contents
Preface
Chapter
1
Chapter
2
Chapter
3
Chapter
4
Chapter
5
Chapter
6
Chapter
7
Chapter
8
Chapter
9
Chapter
10
Index
Constructive Codes for Classical and Quantum Wiretap Channels
Mitsunt Hamada
Concurrent Error Detection/Correction
in Finite Field Arithmetic Architectures over GF(2m)
Chiou-Yng Lee, PramodKumar Meher, Che Wun
Chiou
and
Jim-Min Lin
Fingerprint Based Encryption
Jie
Tian,
Peng Shi, Xin Yang, Zhe Wu, Peng Li and Liang Li
On the Properties of Stream Ciphers Based on Extremal Directed
Graphs
V. Ustimenko and J. Kotorowicz
Morpheus: A Word Oriented Stream Cipher
Nikos Komninos
On the Optimal Mean Photon Number for Quantum Cryptography
David S. Pearson and Chip Elliott
Real-World Evolutionary Designs: Secure Evolvable Hardware
for Public-Key Cryptosystems
Nadia
Nedjah and
Luiza
de Macedo Mourelle
Private and Public Key Systems Using Graphs of high Girth
Abderezak Touzene and Vasyl Ustimenko
High Performance for Cryptographic Hash Cores Implemented
in Hardware
Haralambos
Michail
and Athanasios P. Kakarountas
A Survey on Broadcast Encryption
Scott C.-H. Huang and
Ding-Zhu Du
Vil
1
49
97
125
143
157
177
205
217
233
249 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV035079633 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 |
ctrlnum | (OCoLC)213445791 (DE-599)BVBBV035079633 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01400nam a2200397zc 4500</leader><controlfield tag="001">BV035079633</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091104 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081001s2009 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008013484</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781604564921</subfield><subfield code="c">hardcover</subfield><subfield code="9">978-1-60456-492-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)213445791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035079633</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography research perspectives</subfield><subfield code="c">Roland E. Chen, ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hauppauge, NY</subfield><subfield code="b">Nova Science Publishers</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 257 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Roland E.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016747898&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016747898</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035079633 |
illustrated | Illustrated |
index_date | 2024-07-02T22:06:37Z |
indexdate | 2024-07-09T21:21:43Z |
institution | BVB |
isbn | 9781604564921 |
language | English |
lccn | 2008013484 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016747898 |
oclc_num | 213445791 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | X, 257 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Nova Science Publishers |
record_format | marc |
spelling | Cryptography research perspectives Roland E. Chen, ed. Hauppauge, NY Nova Science Publishers 2009 X, 257 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Chen, Roland E. Sonstige oth Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016747898&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cryptography research perspectives Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4143413-4 |
title | Cryptography research perspectives |
title_auth | Cryptography research perspectives |
title_exact_search | Cryptography research perspectives |
title_exact_search_txtP | Cryptography research perspectives |
title_full | Cryptography research perspectives Roland E. Chen, ed. |
title_fullStr | Cryptography research perspectives Roland E. Chen, ed. |
title_full_unstemmed | Cryptography research perspectives Roland E. Chen, ed. |
title_short | Cryptography research perspectives |
title_sort | cryptography research perspectives |
topic | Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Cryptography Kryptologie Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016747898&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT chenrolande cryptographyresearchperspectives |