Introduction to Cryptography: Principles and Applications
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg
Springer
2015
|
Ausgabe: | Third edition |
Schriftenreihe: | Information Security and Cryptography
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XX, 508 Seiten) 5 Illustrationen |
ISBN: | 9783662479742 |
ISSN: | 1619-7100 |
DOI: | 10.1007/978-3-662-47974-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043209839 | ||
003 | DE-604 | ||
005 | 20191014 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783662479742 |c Online |9 978-3-662-47974-2 | ||
024 | 7 | |a 10.1007/978-3-662-47974-2 |2 doi | |
035 | |a (OCoLC)923674748 | ||
035 | |a (DE-599)BVBBV043209839 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.74 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
100 | 1 | |a Delfs, Hans |d 1949- |e Verfasser |0 (DE-588)132994895 |4 aut | |
245 | 1 | 0 | |a Introduction to Cryptography |b Principles and Applications |c by Hans Delfs, Helmut Knebl |
250 | |a Third edition | ||
264 | 1 | |a Berlin ; Heidelberg |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XX, 508 Seiten) |b 5 Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information Security and Cryptography |x 1619-7100 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Number theory | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Number Theory | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Mathematics of Computing | |
650 | 4 | |a Informatik | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 1 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
700 | 1 | |a Knebl, Helmut |e Verfasser |0 (DE-588)1192515382 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-47973-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-47974-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028633000 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-47974-2 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709391814656 |
---|---|
adam_text | INTRODUCTION TO CRYPTOGRAPHY
/ DELFS, HANS
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
SYMMETRIC-KEY ENCRYPTION
PUBLIC-KEY CRYPTOGRAPHY
CRYPTOGRAPHIC PROTOCOLS
PROBABILISTIC ALGORITHMS
ONE-WAY FUNCTIONS AND THE BASIC ASSUMPTIONS
BIT SECURITY OF ONE-WAY FUNCTIONS
ONE-WAY FUNCTIONS AND PSEUDORANDOMNESS
PROVABLY SECURE ENCRYPTION
UNCONDITIONAL SECURITY OF CRYPTOSYSTEMS
PROVABLY SECURE DIGITAL SIGNATURES
APP. A, ALGEBRA AND NUMBER THEORY
APP. B, PROBABILITIES AND INFORMATION THEORY
REFERENCES
INDEX
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INTRODUCTION TO CRYPTOGRAPHY
/ DELFS, HANS
: 2015
ABSTRACT / INHALTSTEXT
THE FIRST PART OF THIS BOOK COVERS THE KEY CONCEPTS OF CRYPTOGRAPHY ON
AN UNDERGRADUATE LEVEL, FROM ENCRYPTION AND DIGITAL SIGNATURES TO
CRYPTOGRAPHIC PROTOCOLS. ESSENTIAL TECHNIQUES ARE DEMONSTRATED IN
PROTOCOLS FOR KEY EXCHANGE, USER IDENTIFICATION, ELECTRONIC ELECTIONS
AND DIGITAL CASH. IN THE SECOND PART, MORE ADVANCED TOPICS ARE
ADDRESSED, SUCH AS THE BIT SECURITY OF ONE-WAY FUNCTIONS AND
COMPUTATIONALLY PERFECT PSEUDORANDOM BIT GENERATORS. THE SECURITY OF
CRYPTOGRAPHIC SCHEMES IS A CENTRAL TOPIC. TYPICAL EXAMPLES OF PROVABLY
SECURE ENCRYPTION AND SIGNATURE SCHEMES AND THEIR SECURITY PROOFS ARE
GIVEN. THOUGH PARTICULAR ATTENTION IS GIVEN TO THE MATHEMATICAL
FOUNDATIONS, NO SPECIAL BACKGROUND IN MATHEMATICS IS PRESUMED. THE
NECESSARY ALGEBRA, NUMBER THEORY AND PROBABILITY THEORY ARE INCLUDED IN
THE APPENDIX. EACH CHAPTER CLOSES WITH A COLLECTION OF EXERCISES. IN
THE SECOND EDITION THE AUTHORS ADDED A COMPLETE DESCRIPTION OF THE AES,
AN EXTENDED SECTION ON CRYPTOGRAPHIC HASH FUNCTIONS, AND NEW SECTIONS ON
RANDOM ORACLE PROOFS AND PUBLIC-KEY ENCRYPTION SCHEMES THAT ARE PROVABLY
SECURE AGAINST ADAPTIVELY-CHOSEN-CIPHERTEXT ATTACKS. THE THIRD EDITION
IS A FURTHER SUBSTANTIVE EXTENSION, WITH NEW TOPICS ADDED, INCLUDING:
ELLIPTIC CURVE CRYPTOGRAPHY; PAILLIER ENCRYPTION; QUANTUM CRYPTOGRAPHY;
THE NEW SHA-3 STANDARD FOR CRYPTOGRAPHIC HASH FUNCTIONS; A CONSIDERABLY
EXTENDED SECTION ON ELECTRONIC ELECTIONS AND INTERNET VOTING; MIX NETS;
AND ZERO-KNOWLEDGE PROOFS OF SHUFFLES. THE BOOK IS APPROPRIATE FOR
UNDERGRADUATE AND GRADUATE STUDENTS IN COMPUTER SCIENCE, MATHEMATICS,
AND ENGINEERING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Delfs, Hans 1949- Knebl, Helmut |
author_GND | (DE-588)132994895 (DE-588)1192515382 |
author_facet | Delfs, Hans 1949- Knebl, Helmut |
author_role | aut aut |
author_sort | Delfs, Hans 1949- |
author_variant | h d hd h k hk |
building | Verbundindex |
bvnumber | BV043209839 |
classification_rvk | ST 276 ST 273 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)923674748 (DE-599)BVBBV043209839 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-47974-2 |
edition | Third edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04792nmm a2200925zc 4500</leader><controlfield tag="001">BV043209839</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191014 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662479742</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-47974-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-47974-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)923674748</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209839</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Delfs, Hans</subfield><subfield code="d">1949-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132994895</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to Cryptography</subfield><subfield code="b">Principles and Applications</subfield><subfield code="c">by Hans Delfs, Helmut Knebl</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 508 Seiten)</subfield><subfield code="b">5 Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Security and Cryptography</subfield><subfield code="x">1619-7100</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Knebl, Helmut</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1192515382</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-47973-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633000</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-47974-2</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209839 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
isbn | 9783662479742 |
issn | 1619-7100 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633000 |
oclc_num | 923674748 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XX, 508 Seiten) 5 Illustrationen |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series2 | Information Security and Cryptography |
spelling | Delfs, Hans 1949- Verfasser (DE-588)132994895 aut Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl Third edition Berlin ; Heidelberg Springer 2015 1 Online-Ressource (XX, 508 Seiten) 5 Illustrationen txt rdacontent c rdamedia cr rdacarrier Information Security and Cryptography 1619-7100 Computer science Computer security Data structures (Computer science) Computer science / Mathematics Number theory Computer Science Data Structures, Cryptology and Information Theory Number Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Kommunikationsprotokoll (DE-588)4128252-8 s 1\p DE-604 Public-Key-Kryptosystem (DE-588)4209133-0 s 2\p DE-604 Knebl, Helmut Verfasser (DE-588)1192515382 aut Erscheint auch als Druckausgabe 978-3-662-47973-5 https://doi.org/10.1007/978-3-662-47974-2 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Delfs, Hans 1949- Knebl, Helmut Introduction to Cryptography Principles and Applications Computer science Computer security Data structures (Computer science) Computer science / Mathematics Number theory Computer Science Data Structures, Cryptology and Information Theory Number Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptologie (DE-588)4033329-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Kryptosystem (DE-588)4209132-9 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4709127-7 (DE-588)4033329-2 (DE-588)4128252-8 (DE-588)4209132-9 (DE-588)4209133-0 |
title | Introduction to Cryptography Principles and Applications |
title_auth | Introduction to Cryptography Principles and Applications |
title_exact_search | Introduction to Cryptography Principles and Applications |
title_full | Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl |
title_fullStr | Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl |
title_full_unstemmed | Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl |
title_short | Introduction to Cryptography |
title_sort | introduction to cryptography principles and applications |
title_sub | Principles and Applications |
topic | Computer science Computer security Data structures (Computer science) Computer science / Mathematics Number theory Computer Science Data Structures, Cryptology and Information Theory Number Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptologie (DE-588)4033329-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Kryptosystem (DE-588)4209132-9 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Computer science Computer security Data structures (Computer science) Computer science / Mathematics Number theory Computer Science Data Structures, Cryptology and Information Theory Number Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Sicherheitsprotokoll Kryptologie Kommunikationsprotokoll Kryptosystem Public-Key-Kryptosystem |
url | https://doi.org/10.1007/978-3-662-47974-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT delfshans introductiontocryptographyprinciplesandapplications AT kneblhelmut introductiontocryptographyprinciplesandapplications |