Basics of contemporary cryptography for IT practitioners:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
World Scientific
c2005
|
Schriftenreihe: | Series on coding theory and cryptology
1 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references (p. 189-192) and indexes Preface; Contents; Chapter 1 Introduction; Chapter 2 Public Key Cryptosystems; Chapter 3 Solving Discrete Logarithm Problem; Chapter 4 Digital Signatures; Chapter 5 Cryptographic Protocols; Chapter 6 Elliptic Curve Crypt osys t ems; Chapter 7 Theoretical Security of Cryptosystems; Chapter 8 Modern Secret Key Ciphers; Chapter 9 Random Numbers in Cryptography; Answers to Problems and Exercises; Bibliography; Author Index; Subject Index The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for one-semester course |
Beschreibung: | 1 Online-Ressource (ix, 197 p.) |
ISBN: | 9789812703309 9812703306 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043084248 | ||
003 | DE-604 | ||
005 | 20160708 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2005 |||| o||u| ||||||eng d | ||
020 | |a 9789812703309 |c electronic bk. |9 978-981-270-330-9 | ||
020 | |a 9812703306 |c electronic bk. |9 981-270-330-6 | ||
035 | |a (OCoLC)76964885 | ||
035 | |a (DE-599)BVBBV043084248 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/2 |2 22 | |
100 | 1 | |a Ryabko, Boris |e Verfasser |0 (DE-588)1105771326 |4 aut | |
245 | 1 | 0 | |a Basics of contemporary cryptography for IT practitioners |c Boris Ryabko, Andrey Fionov |
264 | 1 | |a Singapore |b World Scientific |c c2005 | |
300 | |a 1 Online-Ressource (ix, 197 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Series on coding theory and cryptology |v 1 | |
500 | |a Includes bibliographical references (p. 189-192) and indexes | ||
500 | |a Preface; Contents; Chapter 1 Introduction; Chapter 2 Public Key Cryptosystems; Chapter 3 Solving Discrete Logarithm Problem; Chapter 4 Digital Signatures; Chapter 5 Cryptographic Protocols; Chapter 6 Elliptic Curve Crypt osys t ems; Chapter 7 Theoretical Security of Cryptosystems; Chapter 8 Modern Secret Key Ciphers; Chapter 9 Random Numbers in Cryptography; Answers to Problems and Exercises; Bibliography; Author Index; Subject Index | ||
500 | |a The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for one-semester course | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
700 | 1 | |a Fionov, Andrey |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028508440 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175478991355904 |
---|---|
any_adam_object | |
author | Ryabko, Boris |
author_GND | (DE-588)1105771326 |
author_facet | Ryabko, Boris |
author_role | aut |
author_sort | Ryabko, Boris |
author_variant | b r br |
building | Verbundindex |
bvnumber | BV043084248 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)76964885 (DE-599)BVBBV043084248 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02724nmm a2200445zcb4500</leader><controlfield tag="001">BV043084248</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160708 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812703309</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-981-270-330-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812703306</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">981-270-330-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)76964885</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043084248</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ryabko, Boris</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1105771326</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Basics of contemporary cryptography for IT practitioners</subfield><subfield code="c">Boris Ryabko, Andrey Fionov</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">World Scientific</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (ix, 197 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Series on coding theory and cryptology</subfield><subfield code="v">1</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 189-192) and indexes</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Preface; Contents; Chapter 1 Introduction; Chapter 2 Public Key Cryptosystems; Chapter 3 Solving Discrete Logarithm Problem; Chapter 4 Digital Signatures; Chapter 5 Cryptographic Protocols; Chapter 6 Elliptic Curve Crypt osys t ems; Chapter 7 Theoretical Security of Cryptosystems; Chapter 8 Modern Secret Key Ciphers; Chapter 9 Random Numbers in Cryptography; Answers to Problems and Exercises; Bibliography; Author Index; Subject Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for one-semester course</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fionov, Andrey</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028508440</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043084248 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:56Z |
institution | BVB |
isbn | 9789812703309 9812703306 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028508440 |
oclc_num | 76964885 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (ix, 197 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | World Scientific |
record_format | marc |
series2 | Series on coding theory and cryptology |
spelling | Ryabko, Boris Verfasser (DE-588)1105771326 aut Basics of contemporary cryptography for IT practitioners Boris Ryabko, Andrey Fionov Singapore World Scientific c2005 1 Online-Ressource (ix, 197 p.) txt rdacontent c rdamedia cr rdacarrier Series on coding theory and cryptology 1 Includes bibliographical references (p. 189-192) and indexes Preface; Contents; Chapter 1 Introduction; Chapter 2 Public Key Cryptosystems; Chapter 3 Solving Discrete Logarithm Problem; Chapter 4 Digital Signatures; Chapter 5 Cryptographic Protocols; Chapter 6 Elliptic Curve Crypt osys t ems; Chapter 7 Theoretical Security of Cryptosystems; Chapter 8 Modern Secret Key Ciphers; Chapter 9 Random Numbers in Cryptography; Answers to Problems and Exercises; Bibliography; Author Index; Subject Index The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for one-semester course COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computer security Cryptography Fionov, Andrey Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557 Aggregator Volltext |
spellingShingle | Ryabko, Boris Basics of contemporary cryptography for IT practitioners COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computer security Cryptography |
title | Basics of contemporary cryptography for IT practitioners |
title_auth | Basics of contemporary cryptography for IT practitioners |
title_exact_search | Basics of contemporary cryptography for IT practitioners |
title_full | Basics of contemporary cryptography for IT practitioners Boris Ryabko, Andrey Fionov |
title_fullStr | Basics of contemporary cryptography for IT practitioners Boris Ryabko, Andrey Fionov |
title_full_unstemmed | Basics of contemporary cryptography for IT practitioners Boris Ryabko, Andrey Fionov |
title_short | Basics of contemporary cryptography for IT practitioners |
title_sort | basics of contemporary cryptography for it practitioners |
topic | COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computer security Cryptography |
topic_facet | COMPUTERS / Security / Cryptography Computer security Cryptography |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174557 |
work_keys_str_mv | AT ryabkoboris basicsofcontemporarycryptographyforitpractitioners AT fionovandrey basicsofcontemporarycryptographyforitpractitioners |