Understanding cryptography: a textbook for students and practitioners
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 359 - 366 |
Beschreibung: | XVIII, 372 S. Ill., graph. Darst. |
ISBN: | 9783642041006 9783642041013 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036039830 | ||
003 | DE-604 | ||
005 | 20181108 | ||
007 | t | ||
008 | 100218s2010 gw ad|| |||| 00||| eng d | ||
015 | |a 09,N38,0042 |2 dnb | ||
015 | |a 10,A03 |2 dnb | ||
016 | 7 | |a 996514864 |2 DE-101 | |
020 | |a 9783642041006 |c Pp : EUR 37.40 (freier Pr.), ca. sfr 85.50 (freier Pr.) |9 978-3-642-04100-6 | ||
020 | |a 9783642041013 |9 978-3-642-04101-3 | ||
024 | 3 | |a 9783642041006 | |
028 | 5 | 2 | |a 12211364 |
035 | |a (OCoLC)501319891 | ||
035 | |a (DE-599)DNB996514864 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-824 |a DE-29T |a DE-634 |a DE-83 |a DE-355 |a DE-11 |a DE-703 |a DE-573 |a DE-898 |a DE-1046 |a DE-B768 |a DE-19 |a DE-188 |a DE-473 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Paar, Christof |d 1963- |e Verfasser |0 (DE-588)1032727705 |4 aut | |
245 | 1 | 0 | |a Understanding cryptography |b a textbook for students and practitioners |c Christof Paar ; Jan Pelzl |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XVIII, 372 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverz. S. 359 - 366 | ||
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Pelzl, Jan |d 1975- |e Verfasser |0 (DE-588)132800780 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-04101-3 |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018931737&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018931737 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804141068231376896 |
---|---|
adam_text | TABLE OF CONTENTS 1 INTRODUCTION TO CRYPTOGRAPHY AND DATA SECURITY 1 1.1
OVERVIEW OF CRYPTOLOGY (AND THIS BOOK) 2 1.2 SYMMETRIC CRYPTOGRAPHY 4
1.2.1 BASICS 4 1.2.2 SIMPLE SYMMETRIC ENCRYPTION: THE SUBSTITUTION
CIPHER.... 6 1.3 CRYPTANALYSIS 9 1.3.1 GENERAL THOUGHTS ON BREAKING
CRYPTOSYSTEMS 9 1.3.2 HOW MANY KEY BITS ARE ENOUGH? 11 1.4 MODULAR
ARITHMETIC AND MORE HISTORICAL CIPHERS 13 1.4.1 MODULAR ARITHMETIC 13
1.4.2 INTEGER RINGS 16 1.4.3 SHIFT CIPHER (OR CAESAR CIPHER) 18 1.4.4
AFFINE CIPHER 19 1.5 DISCUSSION AND FURTHER READING 20 1.6 LESSONS
LEARNED 22 PROBLEMS 24 2 STREAM CIPHERS 29 2.1 INTRODUCTION 30 2.1.1
STREAM CIPHERS VS. BLOCK CIPHERS 30 2.1.2 ENCRYPTION AND DECRYPTION WITH
STREAM CIPHERS 31 2.2 RANDOM NUMBERS AND AN UNBREAKABLE STREAM CIPHER 34
2.2.1 RANDOM NUMBER GENERATORS 34 2.2.2 THE ONE-TIME PAD 36 2.2.3
TOWARDS PRACTICAL STREAM CIPHERS 38 2.3 SHIFT REGISTER-BASED STREAM
CIPHERS 41 2.3.1 LINEAR FEEDBACK SHIFT REGISTERS (LFSR) 41 2.3.2
KNOWN-PLAINTEXT ATTACK AGAINST SINGLE LFSRS 45 2.3.3 TRIVIUM 46 2.4
DISCUSSION AND FURTHER READING 49 BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/996514864 DIGITALISIERT DURCH TABLE OF CONTENTS 2.5
LESSONS LEARNED 50 PROBLEMS 52 THE DATA ENCRYPTION STANDARD (DES) AND
ALTERNATIVES 55 3.1 INTRODUCTION TO DES 56 3.1.1 CONFUSION AND DIFFUSION
57 3.2 OVERVIEW OF THE DES ALGORITHM 58 3.3 INTERNAL STRUCTURE OF DES 61
3.3.1 INITIAL AND FINAL PERMUTATION 61 3.3.2 THE /-FUNCTION 62 3.3.3 KEY
SCHEDULE 67 3.4 DECRYPTION 69 3.5 SECURITY OF DES 72 3.5.1 EXHAUSTIVE
KEY SEARCH 73 3.5.2 ANALYTICAL ATTACKS 75 3.6 IMPLEMENTATION IN SOFTWARE
AND HARDWARE 75 3.7 DES ALTERNATIVES 77 3.7.1 THE ADVANCED ENCRYPTION
STANDARD (AES) AND THE AES FINALIST CIPHERS 77 3.7.2 TRIPLE DES (3DES)
AND DESX 78 3.7.3 LIGHTWEIGHT CIPHER PRESENT 78 3.8 DISCUSSION AND
FURTHER READING 81 3.9 LESSONS LEARNED 82 PROBLEMS 83 THE ADVANCED
ENCRYPTION STANDARD (AES) 87 4.1 INTRODUCTION 88 4.2 OVERVIEW OF THE AES
ALGORITHM 89 4.3 SOME MATHEMATICS: A BRIEF INTRODUCTION TO GALOIS FIELDS
90 4.3.1 EXISTENCE OF FINITE FIELDS 90 4.3.2 PRIME FIELDS 93 4.3.3
EXTENSION FIELDS GF(2 M ) 94 4.3.4 ADDITION AND SUBTRACTION IN GF(2 M )
95 4.3.5 MULTIPLICATION IN GF(2 M ) 96 4.3.6 INVERSION IN GF(2 TABLE OF
CONTENTS XV 5 MORE ABOUT BLOCK CIPHERS 123 5.1 ENCRYPTION WITH BLOCK
CIPHERS: MODES OF OPERATION 124 5.1.1 ELECTRONIC CODEBOOK MODE (ECB) 124
5.1.2 CIPHER BLOCK CHAINING MODE (CBC) 128 5.1.3 OUTPUT FEEDBACK MODE
(OFB) 130 5.1.4 CIPHER FEEDBACK MODE (CFB) 131 5.1.5 COUNTER MODE (CTR)
132 5.1.6 GALOIS COUNTER MODE (GCM) 134 5.2 EXHAUSTIVE KEY SEARCH
REVISITED 136 5.3 INCREASING THE SECURITY OF BLOCK CIPHERS 137 5.3.1
DOUBLE ENCRYPTION AND MEET-IN-THE-MIDDLE ATTACK 138 5.3.2 TRIPLE
ENCRYPTION 140 5.3.3 KEY WHITENING 141 5.4 DISCUSSION AND FURTHER
READING 143 5.5 LESSONS LEARNED 144 PROBLEMS 145 6 INTRODUCTION TO
PUBLIC-KEY CRYPTOGRAPHY 149 6. 1 SYMMETRIC VS. ASYMMETRIC CRYPTOGRAPHY
150 6.2 PRACTICAL ASPECTS OF PUBLIC-KEY CRYPTOGRAPHY 153 6.2.1 SECURITY
MECHANISMS 154 6.2.2 THE REMAINING PROBLEM: AUTHENTICITY OF PUBLIC KEYS
154 6.2.3 IMPORTANT PUBLIC-KEY ALGORITHMS 155 6.2.4 KEY LENGTHS AND
SECURITY LEVELS 156 6.3 ESSENTIAL NUMBER THEORY FOR PUBLIC-KEY
ALGORITHMS 157 6.3.1 EUCLIDEAN ALGORITHM 157 6.3.2 EXTENDED EUCLIDEAN
ALGORITHM 160 6.3.3 EULER S PHI FUNCTION 164 6.3.4 FERMAT S LITTLE
THEOREM AND EULER S THEOREM 166 6.4 DISCUSSION AND FURTHER READING 168
6.5 LESSONS LEARNED 169 PROBLEMS 170 7 THE RSA CRYPTOSYSTEM 17 XVI TABLE
OF CONTENTS 7.8 ATTACKS 194 7.9 IMPLEMENTATION IN SOFTWARE AND HARDWARE
197 7.10 DISCUSSION AND FURTHER READING 198 7.11 LESSONS LEARNED 199
PROBLEMS 200 8 PUBLIC-KEY CRYPTOSYSTEMS BASED ON THE DISCRETE LOGARITHM
PROBLEM 205 8.1 DIFFIE-HELLMAN KEY EXCHANGE 206 8.2 SOME ALGEBRA 208
8.2.1 GROUPS 208 8.2.2 CYCLIC GROUPS 210 8.2.3 SUBGROUPS 214 8.3 THE
DISCRETE LOGARITHM PROBLEM 216 8.3.1 THE DISCRETE LOGARITHM PROBLEM IN
PRIME FIELDS 216 8.3.2 THE GENERALIZED DISCRETE LOGARITHM PROBLEM 218
8.3.3 ATTACKS AGAINST THE DISCRETE LOGARITHM PROBLEM 219 8.4 SECURITY OF
THE DIFFIE-HELLMAN KEY EXCHANGE 225 8.5 THE ELGAMAL ENCRYPTION SCHEME
226 8.5.1 FROM DIFFIE-HELLMAN KEY EXHANGE TO ELGAMAL ENCRYPTION . 226
8.5.2 THE ELGAMAL PROTOCOL 227 8.5.3 COMPUTATIONAL ASPECTS 229 8.5.4
SECURITY 230 8.6 DISCUSSION AND FURTHER READING 232 8.7 LESSONS LEARNED
233 PROBLEMS 234 9 ELLIPTIC CURVE CRYPTOSYSTEMS 239 9.1 HOW TO COMPUTE
WITH ELLIPTIC CURVES 239 9.1.1 DEFINITION OF ELLIPTIC CURVES 240 9.1.2
GROUP OPERATIONS ON ELLIPTIC CURVES 242 9.2 BUILDING A DISCRETE
LOGARITHM PROBLEM WITH ELLIPTIC CURVES 245 9.3 DIFFIE-HELLMAN KEY
EXCHANGE WITH ELLIPTIC CURVES 249 9.4 SECURITY 251 9.5 IMPLEMENTATION IN
SOFTWARE AND HARDWARE 252 9.6 DISCUSSION AND FURTHER READING 253 9.
TABLE OF CONTENTS XVII 10.2.1 SCHOOLBOOK RSA DIGITAL SIGNATURE 265
10.2.2 COMPUTATIONAL ASPECTS 267 10.2.3 SECURITY 267 10.3 THE ELGAMAL
DIGITAL SIGNATURE SCHEME 270 10.3.1 SCHOOLBOOK ELGAMAL DIGITAL SIGNATURE
270 10.3.2 COMPUTATIONAL ASPECTS 273 10.3.3 SECURITY 274 10.4 THE
DIGITAL SIGNATURE ALGORITHM (DSA) 277 10.4.1 THE DSA ALGORITHM 277
10.4.2 COMPUTATIONAL ASPECTS 280 10.4.3 SECURITY 281 10.5 THE ELLIPTIC
CURVE DIGITAL SIGNATURE ALGORITHM (ECDSA) 282 10.5.1 THE ECDSA ALGORITHM
282 10.5.2 COMPUTATIONAL ASPECTS 285 10.5.3 SECURITY 286 10.6 DISCUSSION
AND FURTHER READING 287 10.7 LESSONS LEARNED 288 PROBLEMS 289 11 HASH
FUNCTIONS 293 11.1 MOTIVATION: SIGNING LONG MESSAGES 294 11.2 SECURITY
REQUIREMENTS OF HASH FUNCTIONS 296 11.2.1 PREIMAGE RESISTANCE OR
ONE-WAYNESS 297 11.2.2 SECOND PREIMAGE RESISTANCE OR WEAK COLLISION
RESISTANCE .297 11.2.3 COLLISION RESISTANCE AND THE BIRTHDAY ATTACK 299
11.3 OVERVIEW OF HASH ALGORITHMS 303 11.3.1 DEDICATED HASH FUNCTIONS:
THE MD4 FAMILY 304 11.3.2 HASH FUNCTIONS FROM BLOCK CIPHERS 305 11.4 THE
SECURE HASH ALGORITHM SHA-1 307 11.4.1 PREPROCESSING 308 11.4.2 HASH
COMPUTATION 309 11.4.3 IMPLEMENTATION 312 11.5 DISCUSSION AND FURTHER
READING 312 11.6 LESSONS LEARNED 313 PROBLEMS 315 12 MESSAGE
AUTHENTICATION CODES (MACS) 31 XVIUE TABLE OF CONTENTS 13 KEY
ESTABLISHMENT 331 13.1 INTRODUCTION 332 13.1.1 SOME TERMINOLOGY 332
13.1.2 KEY FRESHNESS AND KEY DERIVATION 332 13.1.3 THE N 2 KEY
DISTRIBUTION PROBLEM 334 13.2 KEY ESTABLISHMENT USING SYMMETRIC-KEY
TECHNIQUES 336 13.2.1 KEY ESTABLISHMENT WITH A KEY DISTRIBUTION CENTER
336 13.2.2 KERBEROS 339 13.2.3 REMAINING PROBLEMS WITH SYMMETRIC-KEY
DISTRIBUTION 341 13.3 KEY ESTABLISHMENT USING ASYMMETRIC TECHNIQUES 342
13.3.1 MAN-IN-THE-MIDDLE ATTACK 342 13.3.2 CERTIFICATES 344 13.3.3
PUBLIC-KEY INFRASTRUCTURES (PKI) AND CAS 347 13.4 DISCUSSION AND FURTHER
READING 351 13.5 LESSONS LEARNED 352 PROBLEMS 353 REFERENCES 359 INDEX
367
|
any_adam_object | 1 |
author | Paar, Christof 1963- Pelzl, Jan 1975- |
author_GND | (DE-588)1032727705 (DE-588)132800780 |
author_facet | Paar, Christof 1963- Pelzl, Jan 1975- |
author_role | aut aut |
author_sort | Paar, Christof 1963- |
author_variant | c p cp j p jp |
building | Verbundindex |
bvnumber | BV036039830 |
classification_rvk | SK 170 ST 276 |
ctrlnum | (OCoLC)501319891 (DE-599)DNB996514864 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02539nam a2200601 c 4500</leader><controlfield tag="001">BV036039830</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181108 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100218s2010 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N38,0042</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,A03</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">996514864</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642041006</subfield><subfield code="c">Pp : EUR 37.40 (freier Pr.), ca. sfr 85.50 (freier Pr.)</subfield><subfield code="9">978-3-642-04100-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642041013</subfield><subfield code="9">978-3-642-04101-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642041006</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12211364</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)501319891</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB996514864</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-824</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Paar, Christof</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1032727705</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding cryptography</subfield><subfield code="b">a textbook for students and practitioners</subfield><subfield code="c">Christof Paar ; Jan Pelzl</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 372 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 359 - 366</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pelzl, Jan</subfield><subfield code="d">1975-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132800780</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-04101-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018931737&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018931737</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV036039830 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:09:59Z |
institution | BVB |
isbn | 9783642041006 9783642041013 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018931737 |
oclc_num | 501319891 |
open_access_boolean | |
owner | DE-824 DE-29T DE-634 DE-83 DE-355 DE-BY-UBR DE-11 DE-703 DE-573 DE-898 DE-BY-UBR DE-1046 DE-B768 DE-19 DE-BY-UBM DE-188 DE-473 DE-BY-UBG |
owner_facet | DE-824 DE-29T DE-634 DE-83 DE-355 DE-BY-UBR DE-11 DE-703 DE-573 DE-898 DE-BY-UBR DE-1046 DE-B768 DE-19 DE-BY-UBM DE-188 DE-473 DE-BY-UBG |
physical | XVIII, 372 S. Ill., graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
spelling | Paar, Christof 1963- Verfasser (DE-588)1032727705 aut Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl Berlin [u.a.] Springer 2010 XVIII, 372 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturverz. S. 359 - 366 Internet (DE-588)4308416-3 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Internet (DE-588)4308416-3 s Kryptologie (DE-588)4033329-2 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Kryptosystem (DE-588)4209132-9 s 2\p DE-604 Pelzl, Jan 1975- Verfasser (DE-588)132800780 aut Erscheint auch als Online-Ausgabe 978-3-642-04101-3 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018931737&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Paar, Christof 1963- Pelzl, Jan 1975- Understanding cryptography a textbook for students and practitioners Internet (DE-588)4308416-3 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4209132-9 (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4123623-3 |
title | Understanding cryptography a textbook for students and practitioners |
title_auth | Understanding cryptography a textbook for students and practitioners |
title_exact_search | Understanding cryptography a textbook for students and practitioners |
title_full | Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl |
title_fullStr | Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl |
title_full_unstemmed | Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl |
title_short | Understanding cryptography |
title_sort | understanding cryptography a textbook for students and practitioners |
title_sub | a textbook for students and practitioners |
topic | Internet (DE-588)4308416-3 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Internet Kryptosystem Datensicherung Kryptologie Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018931737&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT paarchristof understandingcryptographyatextbookforstudentsandpractitioners AT pelzljan understandingcryptographyatextbookforstudentsandpractitioners |