Public key cryptography: applications and attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
John Wiley & Sons
c2013
|
Schriftenreihe: | IEEE Press series on information and communication networks security
|
Schlagworte: | |
Online-Zugang: | FHA01 FRO01 UBG01 FHI01 FHN01 Volltext |
Beschreibung: | Includes bibliographical references and index This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur |
Beschreibung: | 1 Online-Ressource (xvii, 201 p.) |
ISBN: | 9781118482315 111848231X 9781118482261 1118482263 1118317122 9781283960526 1283960524 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043395533 | ||
003 | DE-604 | ||
005 | 20170320 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781118482315 |c electronic bk. |9 978-1-118-48231-5 | ||
020 | |a 111848231X |c electronic bk. |9 1-118-48231-X | ||
020 | |a 9781118482261 |c electronic bk. |9 978-1-118-48226-1 | ||
020 | |a 1118482263 |c electronic bk. |9 1-118-48226-3 | ||
020 | |a 1118317122 |9 1-118-31712-2 | ||
020 | |a 9781283960526 |c MyiLibrary |9 978-1-283-96052-6 | ||
020 | |a 1283960524 |c MyiLibrary |9 1-283-96052-4 | ||
024 | 7 | |a 10.1002/9781118482261 |2 doi | |
035 | |a (ZDB-35-WIC)ocn828735989 | ||
035 | |a (OCoLC)828735989 | ||
035 | |a (DE-599)BVBBV043395533 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-861 |a DE-573 |a DE-92 | ||
082 | 0 | |a 005.8/2 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Batten, Lynn Margaret |e Verfasser |4 aut | |
245 | 1 | 0 | |a Public key cryptography |b applications and attacks |c Lynn Margaret Batten |
264 | 1 | |a Hoboken, N.J. |b John Wiley & Sons |c c2013 | |
300 | |a 1 Online-Ressource (xvii, 201 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IEEE Press series on information and communication networks security | |
500 | |a Includes bibliographical references and index | ||
500 | |a This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur | ||
650 | 7 | |a Cryptography / Mathematics |2 fast | |
650 | 7 | |a Public key cryptography |2 fast | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 4 | |a Cryptography / History | |
650 | 4 | |a Cryptography / Mathematics | |
650 | 4 | |a Public key cryptography | |
650 | 4 | |a Geschichte | |
650 | 4 | |a Mathematik | |
650 | 4 | |a Public key cryptography | |
650 | 4 | |a Cryptography / Mathematics | |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
655 | 7 | |8 1\p |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-118-31712-9 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-WEL | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028814117 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474 |l FHI01 |p ZDB-35-WEL |x Aggregator |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474 |l FHN01 |p ZDB-35-WEL |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175975485800448 |
---|---|
any_adam_object | |
author | Batten, Lynn Margaret |
author_facet | Batten, Lynn Margaret |
author_role | aut |
author_sort | Batten, Lynn Margaret |
author_variant | l m b lm lmb |
building | Verbundindex |
bvnumber | BV043395533 |
classification_rvk | ST 276 |
collection | ZDB-35-WIC ZDB-35-WEL |
ctrlnum | (ZDB-35-WIC)ocn828735989 (OCoLC)828735989 (DE-599)BVBBV043395533 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03820nmm a2200721zc 4500</leader><controlfield tag="001">BV043395533</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170320 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118482315</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-48231-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111848231X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-48231-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118482261</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-48226-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118482263</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-48226-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118317122</subfield><subfield code="9">1-118-31712-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283960526</subfield><subfield code="c">MyiLibrary</subfield><subfield code="9">978-1-283-96052-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283960524</subfield><subfield code="c">MyiLibrary</subfield><subfield code="9">1-283-96052-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118482261</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn828735989</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828735989</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043395533</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Batten, Lynn Margaret</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public key cryptography</subfield><subfield code="b">applications and attacks</subfield><subfield code="c">Lynn Margaret Batten</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">c2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 201 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE Press series on information and communication networks security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography / Mathematics</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography / History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geschichte</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography / Mathematics</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-118-31712-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028814117</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV043395533 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:50Z |
institution | BVB |
isbn | 9781118482315 111848231X 9781118482261 1118482263 1118317122 9781283960526 1283960524 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028814117 |
oclc_num | 828735989 |
open_access_boolean | |
owner | DE-Aug4 DE-861 DE-573 DE-92 |
owner_facet | DE-Aug4 DE-861 DE-573 DE-92 |
physical | 1 Online-Ressource (xvii, 201 p.) |
psigel | ZDB-35-WIC ZDB-35-WEL UBG_PDA_WIC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | John Wiley & Sons |
record_format | marc |
series2 | IEEE Press series on information and communication networks security |
spelling | Batten, Lynn Margaret Verfasser aut Public key cryptography applications and attacks Lynn Margaret Batten Hoboken, N.J. John Wiley & Sons c2013 1 Online-Ressource (xvii, 201 p.) txt rdacontent c rdamedia cr rdacarrier IEEE Press series on information and communication networks security Includes bibliographical references and index This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur Cryptography / Mathematics fast Public key cryptography fast COMPUTERS / Security / Cryptography bisacsh Cryptography / History Cryptography / Mathematics Public key cryptography Geschichte Mathematik Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Electronic books 1\p (DE-588)4123623-3 Lehrbuch gnd-content Public-Key-Kryptosystem (DE-588)4209133-0 s 2\p DE-604 Erscheint auch als Druck-Ausgabe, Hardcover 978-1-118-31712-9 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Batten, Lynn Margaret Public key cryptography applications and attacks Cryptography / Mathematics fast Public key cryptography fast COMPUTERS / Security / Cryptography bisacsh Cryptography / History Cryptography / Mathematics Public key cryptography Geschichte Mathematik Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4209133-0 (DE-588)4123623-3 |
title | Public key cryptography applications and attacks |
title_auth | Public key cryptography applications and attacks |
title_exact_search | Public key cryptography applications and attacks |
title_full | Public key cryptography applications and attacks Lynn Margaret Batten |
title_fullStr | Public key cryptography applications and attacks Lynn Margaret Batten |
title_full_unstemmed | Public key cryptography applications and attacks Lynn Margaret Batten |
title_short | Public key cryptography |
title_sort | public key cryptography applications and attacks |
title_sub | applications and attacks |
topic | Cryptography / Mathematics fast Public key cryptography fast COMPUTERS / Security / Cryptography bisacsh Cryptography / History Cryptography / Mathematics Public key cryptography Geschichte Mathematik Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Cryptography / Mathematics Public key cryptography COMPUTERS / Security / Cryptography Cryptography / History Geschichte Mathematik Public-Key-Kryptosystem Lehrbuch |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261 |
work_keys_str_mv | AT battenlynnmargaret publickeycryptographyapplicationsandattacks |