Construction and analysis of cryptographic functions:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schlagworte: | |
Beschreibung: | VIII, 168 S. |
ISBN: | 9783319129907 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042365910 | ||
003 | DE-604 | ||
005 | 20150219 | ||
007 | t | ||
008 | 150217s2014 |||| 00||| eng d | ||
020 | |a 9783319129907 |c Print |9 978-3-319-12990-7 | ||
035 | |a (OCoLC)906037789 | ||
035 | |a (DE-599)BVBBV042365910 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 003.54 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Budaghyan, Lilya |d 1976- |e Verfasser |0 (DE-588)130826731 |4 aut | |
245 | 1 | 0 | |a Construction and analysis of cryptographic functions |c Lilya Budaghyan |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a VIII, 168 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Functional equations | |
650 | 4 | |a Combinatorics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Difference and Functional Equations | |
650 | 4 | |a Informatik | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-12991-4 |
999 | |a oai:aleph.bib-bvb.de:BVB01-027802253 |
Datensatz im Suchindex
_version_ | 1804152999824588800 |
---|---|
any_adam_object | |
author | Budaghyan, Lilya 1976- |
author_GND | (DE-588)130826731 |
author_facet | Budaghyan, Lilya 1976- |
author_role | aut |
author_sort | Budaghyan, Lilya 1976- |
author_variant | l b lb |
building | Verbundindex |
bvnumber | BV042365910 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)906037789 (DE-599)BVBBV042365910 |
dewey-full | 003.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003.54 |
dewey-search | 003.54 |
dewey-sort | 13.54 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01260nam a2200409 c 4500</leader><controlfield tag="001">BV042365910</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150219 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150217s2014 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319129907</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-12990-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)906037789</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042365910</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Budaghyan, Lilya</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130826731</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Construction and analysis of cryptographic functions</subfield><subfield code="c">Lilya Budaghyan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 168 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Functional equations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Combinatorics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Difference and Functional Equations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-12991-4</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027802253</subfield></datafield></record></collection> |
id | DE-604.BV042365910 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:19:38Z |
institution | BVB |
isbn | 9783319129907 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027802253 |
oclc_num | 906037789 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | VIII, 168 S. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
spelling | Budaghyan, Lilya 1976- Verfasser (DE-588)130826731 aut Construction and analysis of cryptographic functions Lilya Budaghyan Cham [u.a.] Springer 2014 VIII, 168 S. txt rdacontent n rdamedia nc rdacarrier Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik Erscheint auch als Online-Ausgabe 978-3-319-12991-4 |
spellingShingle | Budaghyan, Lilya 1976- Construction and analysis of cryptographic functions Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik |
title | Construction and analysis of cryptographic functions |
title_auth | Construction and analysis of cryptographic functions |
title_exact_search | Construction and analysis of cryptographic functions |
title_full | Construction and analysis of cryptographic functions Lilya Budaghyan |
title_fullStr | Construction and analysis of cryptographic functions Lilya Budaghyan |
title_full_unstemmed | Construction and analysis of cryptographic functions Lilya Budaghyan |
title_short | Construction and analysis of cryptographic functions |
title_sort | construction and analysis of cryptographic functions |
topic | Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik |
topic_facet | Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik |
work_keys_str_mv | AT budaghyanlilya constructionandanalysisofcryptographicfunctions |