Algebraic Aspects of Cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
1998
|
Schriftenreihe: | Algorithms and Computation in Mathematics
3 |
Schlagworte: | |
Online-Zugang: | UBY01 UPA01 Volltext |
Beschreibung: | This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: "... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D.Burmester, Mathematical Reviews 2002 "... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 "... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E.Leiss, Computing Reviews 1998 |
Beschreibung: | 1 Online-Ressource (IX, 206 Seiten) Illustrationen, Diagramme |
ISBN: | 9783662036426 |
ISSN: | 1431-1550 |
DOI: | 10.1007/978-3-662-03642-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042423274 | ||
003 | DE-604 | ||
005 | 20231102 | ||
007 | cr|uuu---uuuuu | ||
008 | 150317s1998 |||| o||u| ||||||eng d | ||
020 | |a 9783662036426 |9 978-3-662-03642-6 | ||
024 | 7 | |a 10.1007/978-3-662-03642-6 |2 doi | |
035 | |a (ZDB-30-PQE)3097763 | ||
035 | |a (OCoLC)864077419 | ||
035 | |a (DE-599)BVBBV042423274 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-703 |a DE-91 |a DE-634 |a DE-739 |a DE-706 | ||
082 | 0 | |a 512.7 |2 23 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a MAT 000 |2 stub | ||
100 | 1 | |a Koblitz, Neal |d 1948- |e Verfasser |0 (DE-588)108974820 |4 aut | |
245 | 1 | 0 | |a Algebraic Aspects of Cryptography |c by Neal Koblitz |
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 1998 | |
300 | |a 1 Online-Ressource (IX, 206 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Algorithms and Computation in Mathematics |v 3 |x 1431-1550 | |
500 | |a This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: "... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D.Burmester, Mathematical Reviews 2002 "... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 "... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E.Leiss, Computing Reviews 1998 | ||
650 | 4 | |a Mathematics | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Combinatorics | |
650 | 4 | |a Number theory | |
650 | 4 | |a Number Theory | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Algebraische Methode |0 (DE-588)4141841-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Algebraische Geometrie |0 (DE-588)4001161-6 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Algebraische Methode |0 (DE-588)4141841-4 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 1 | |a Algebraische Geometrie |0 (DE-588)4001161-6 |D s |
689 | 1 | |8 3\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-3-540-63446-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-08332-7 |
830 | 0 | |a Algorithms and Computation in Mathematics |v 3 |w (DE-604)BV036602654 |9 3 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-03642-6 |x Verlag |3 Volltext |
912 | |a ZDB-2-SMA |a ZDB-2-BAE |a ZDB-30-PQE | ||
940 | 1 | |q ZDB-2-SMA_Archive | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027858691 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://ebookcentral.proquest.com/lib/unibwm/detail.action?docID=3097763 |l UBY01 |p ZDB-30-PQE |q UBY01_Einzelkauf23 |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-03642-6 |l UPA01 |p ZDB-2-BAE |q UPA_Einzelkauf_2022 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804153098818551808 |
---|---|
any_adam_object | |
author | Koblitz, Neal 1948- |
author_GND | (DE-588)108974820 |
author_facet | Koblitz, Neal 1948- |
author_role | aut |
author_sort | Koblitz, Neal 1948- |
author_variant | n k nk |
building | Verbundindex |
bvnumber | BV042423274 |
classification_rvk | SK 170 ST 273 ST 276 |
classification_tum | MAT 000 |
collection | ZDB-2-SMA ZDB-2-BAE ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)3097763 (OCoLC)864077419 (DE-599)BVBBV042423274 |
dewey-full | 512.7 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 512 - Algebra |
dewey-raw | 512.7 |
dewey-search | 512.7 |
dewey-sort | 3512.7 |
dewey-tens | 510 - Mathematics |
discipline | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-662-03642-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04893nmm a2200721zcb4500</leader><controlfield tag="001">BV042423274</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231102 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150317s1998 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662036426</subfield><subfield code="9">978-3-662-03642-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-03642-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)3097763</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864077419</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042423274</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">512.7</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Koblitz, Neal</subfield><subfield code="d">1948-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)108974820</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Algebraic Aspects of Cryptography</subfield><subfield code="c">by Neal Koblitz</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">1998</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (IX, 206 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Algorithms and Computation in Mathematics</subfield><subfield code="v">3</subfield><subfield code="x">1431-1550</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: "... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D.Burmester, Mathematical Reviews 2002 "... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 "... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E.Leiss, Computing Reviews 1998</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Combinatorics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Algebraische Methode</subfield><subfield code="0">(DE-588)4141841-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Algebraische Geometrie</subfield><subfield code="0">(DE-588)4001161-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Algebraische Methode</subfield><subfield code="0">(DE-588)4141841-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Algebraische Geometrie</subfield><subfield code="0">(DE-588)4001161-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-3-540-63446-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-08332-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Algorithms and Computation in Mathematics</subfield><subfield code="v">3</subfield><subfield code="w">(DE-604)BV036602654</subfield><subfield code="9">3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-03642-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SMA</subfield><subfield code="a">ZDB-2-BAE</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SMA_Archive</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027858691</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/unibwm/detail.action?docID=3097763</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">UBY01_Einzelkauf23</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-03642-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-BAE</subfield><subfield code="q">UPA_Einzelkauf_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV042423274 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:21:13Z |
institution | BVB |
isbn | 9783662036426 |
issn | 1431-1550 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027858691 |
oclc_num | 864077419 |
open_access_boolean | |
owner | DE-384 DE-703 DE-91 DE-BY-TUM DE-634 DE-739 DE-706 |
owner_facet | DE-384 DE-703 DE-91 DE-BY-TUM DE-634 DE-739 DE-706 |
physical | 1 Online-Ressource (IX, 206 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-SMA ZDB-2-BAE ZDB-30-PQE ZDB-2-SMA_Archive ZDB-30-PQE UBY01_Einzelkauf23 ZDB-2-BAE UPA_Einzelkauf_2022 |
publishDate | 1998 |
publishDateSearch | 1998 |
publishDateSort | 1998 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series | Algorithms and Computation in Mathematics |
series2 | Algorithms and Computation in Mathematics |
spelling | Koblitz, Neal 1948- Verfasser (DE-588)108974820 aut Algebraic Aspects of Cryptography by Neal Koblitz Berlin, Heidelberg Springer Berlin Heidelberg 1998 1 Online-Ressource (IX, 206 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Algorithms and Computation in Mathematics 3 1431-1550 This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: "... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D.Burmester, Mathematical Reviews 2002 "... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 "... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E.Leiss, Computing Reviews 1998 Mathematics Data structures (Computer science) Data encryption (Computer science) Combinatorics Number theory Number Theory Data Structures, Cryptology and Information Theory Data Encryption Mathematik Kryptologie (DE-588)4033329-2 gnd rswk-swf Algebraische Methode (DE-588)4141841-4 gnd rswk-swf Algebraische Geometrie (DE-588)4001161-6 gnd rswk-swf 1\p (DE-588)4123623-3 Lehrbuch gnd-content Kryptologie (DE-588)4033329-2 s Algebraische Methode (DE-588)4141841-4 s 2\p DE-604 Algebraische Geometrie (DE-588)4001161-6 s 3\p DE-604 Erscheint auch als Druck-Ausgabe, Hardcover 978-3-540-63446-1 Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-08332-7 Algorithms and Computation in Mathematics 3 (DE-604)BV036602654 3 https://doi.org/10.1007/978-3-662-03642-6 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Koblitz, Neal 1948- Algebraic Aspects of Cryptography Algorithms and Computation in Mathematics Mathematics Data structures (Computer science) Data encryption (Computer science) Combinatorics Number theory Number Theory Data Structures, Cryptology and Information Theory Data Encryption Mathematik Kryptologie (DE-588)4033329-2 gnd Algebraische Methode (DE-588)4141841-4 gnd Algebraische Geometrie (DE-588)4001161-6 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4141841-4 (DE-588)4001161-6 (DE-588)4123623-3 |
title | Algebraic Aspects of Cryptography |
title_auth | Algebraic Aspects of Cryptography |
title_exact_search | Algebraic Aspects of Cryptography |
title_full | Algebraic Aspects of Cryptography by Neal Koblitz |
title_fullStr | Algebraic Aspects of Cryptography by Neal Koblitz |
title_full_unstemmed | Algebraic Aspects of Cryptography by Neal Koblitz |
title_short | Algebraic Aspects of Cryptography |
title_sort | algebraic aspects of cryptography |
topic | Mathematics Data structures (Computer science) Data encryption (Computer science) Combinatorics Number theory Number Theory Data Structures, Cryptology and Information Theory Data Encryption Mathematik Kryptologie (DE-588)4033329-2 gnd Algebraische Methode (DE-588)4141841-4 gnd Algebraische Geometrie (DE-588)4001161-6 gnd |
topic_facet | Mathematics Data structures (Computer science) Data encryption (Computer science) Combinatorics Number theory Number Theory Data Structures, Cryptology and Information Theory Data Encryption Mathematik Kryptologie Algebraische Methode Algebraische Geometrie Lehrbuch |
url | https://doi.org/10.1007/978-3-662-03642-6 |
volume_link | (DE-604)BV036602654 |
work_keys_str_mv | AT koblitzneal algebraicaspectsofcryptography |