The New codebreakers: Essays dedicated to David Kahn on the occasion of his 85th birthday
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin
Springer
[2016]
|
Schriftenreihe: | Lecture Notes in Computer Science
9100 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource XIV, 551 Seiten Illustrationen, Diagramme |
ISBN: | 9783662493014 9783662493007 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-49301-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043503863 | ||
003 | DE-604 | ||
005 | 20160708 | ||
007 | cr|uuu---uuuuu | ||
008 | 160411s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783662493014 |c Online |9 978-3-662-49301-4 | ||
020 | |a 9783662493007 |c Print |9 978-3-662-49300-7 | ||
024 | 7 | |a 10.1007/978-3-662-49301-4 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-662-49301-4 | ||
035 | |a (ZDB-2-LNC)978-3-662-49301-4 | ||
035 | |a (OCoLC)946150768 | ||
035 | |a (DE-599)BVBBV043503863 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-706 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-523 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a The New codebreakers |b Essays dedicated to David Kahn on the occasion of his 85th birthday |c edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater |
264 | 1 | |a Berlin |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource XIV, 551 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 9100 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)4016928-5 |a Festschrift |2 gnd-content | |
700 | 1 | |a Ryan, Peter Y. A. |4 edt | |
700 | 1 | |a Kahn, David |d 1930-2024 |0 (DE-588)133642437 |4 hnr | |
830 | 0 | |a Lecture Notes in Computer Science |v 9100 |w (DE-604)BV014880109 |9 9100 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-49301-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028920208 | ||
966 | e | |l BTU01 |u https://doi.org/10.1007/978-3-662-49301-4 |p ZDB-2-LNC |q ZDB-2-LNC-2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l FHI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |l UBY01 |u https://doi.org/10.1007/978-3-662-49301-4 |p ZDB-2-LNC |q ZDB-2-LNC-2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-49301-4 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176140904955904 |
---|---|
adam_text | THE NEW CODEBREAKERS
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
HISTORY
MARY OF GUISE’S ENCIPHERED LETTERS
ABOUT PROFESSIONALISATION IN THE INTELLIGENCE COMMUNITY: THE FRENCH
CRYPTOLOGISTS (CA 1870-CA 1945)
MYTHS AND LEGENDS
THE ONE-TIME PAD AND THE INDEX OF COINCIDENCE
TECHNOLOGY - PAST, PRESENT, FUTURE
THE FALL OF A TINY STAR
POST-QUANTUM CRYPTOGRAPHY: STATE OF THE ART
WHAT IS THE FUTURE OF CRYPTOGRAPHY?
EFFICIENT CRYPTOGRAPHIC IMPLEMENTATIONS
BITSLICED HIGH-PERFORMANCE AES-ECB ON GPUS
BUYING AES DESIGN RESISTANCE WITH SPEED AND ENERGY
DOUBLE-SPEED BARRETT MODULI
TREACHERY AND PERFIDY
FAILURE IS ALSO AN OPTION
HOW TO (CAREFULLY) BREACH A SERVICE CONTRACT?
INFORMATION SECURITY
SPOOFKILLER: YOU CAN TEACH PEOPLE HOW TO PAY, BUT NOT HOW TO PAY
ATTENTION
CYBER-PHYSICAL SYSTEMS SECURITY
PRACTICAL TECHNIQUES BUILDING ON ENCRYPTION FOR PROTECTING AND MANAGING
DATA IN THE CLOUD
CRYPTANALYSIS
CRYPTOGRAPHY AS AN ATTACK TECHNOLOGY: PROVING THE RSA/FACTORING
KLEPTOGRAPHIC ATTACK
DUAL EC: A STANDARDIZED BACK DOOR
AN IMPROVED DIFFERENTIAL ATTACK ON FULL GOST
CRYPTOGRAPHIC HASH FUNCTIONS AND EXPANDER GRAPHS: THE END OF THE STORY?
SIDE-CHANNEL ATTACKS
POLYNOMIAL EVALUATION AND SIDE CHANNEL ANALYSIS
PHOTONIC POWER FIREWALLS
A HEURISTIC APPROACH TO ASSIST SIDE CHANNEL ANALYSIS OF THE DATA
ENCRYPTION STANDARD
IMPROVING THE BIG MAC ATTACK ON ELLIPTIC CURVE CRYPTOGRAPHY
RANDOMNESS
RANDOMNESS TESTING: RESULT INTERPRETATION AND SPEED
A FULLY-DIGITAL CHAOS-BASED RANDOM BIT GENERATOR
EMBEDDED SYSTEM SECURITY
SECURE APPLICATION EXECUTION IN MOBILE DEVICES
HARDWARE-ENFORCED PROTECTION AGAINST BUFFER OVERFLOW USING MASKED
PROGRAM COUNTER
PUBLIC-KEY CRYPTOGRAPHY
HIERARCHICAL IDENTITIES FROM GROUP SIGNATURES AND PSEUDONYMOUS
SIGNATURES
SECURE ELGAMAL-TYPE CRYPTOSYSTEMS WITHOUT MESSAGE ENCODING
SAFE-ERRORS ON SPA PROTECTED IMPLEMENTATIONS WITH THE ATOMICITY
TECHNIQUE
MODELS AND PROTOCOLS
CLEVER ARBITERS VERSUS MALICIOUS ADVERSARIES: ON THE GAP BETWEEN
KNOWN-INPUT SECURITY AND CHOSEN-INPUT SECURITY
SECURITY ANALYSIS OF THE MODULAR ENHANCED SYMMETRIC ROLE AUTHENTICATION
(MERA) PROTOCOL
CRYPTO SANTA.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
THE NEW CODEBREAKERS
/
: 2016
ABSTRACT / INHALTSTEXT
THIS FESTSCHRIFT VOLUME IS PUBLISHED IN HONOR OF DAVID KAHN AND IS THE
OUTCOME OF A FEST HELD IN LUXEMBOURG IN 2010 ON THE OCCASION OF DAVID
KAHN’S 80TH BIRTHDAY. THE TITLE OF THIS BOOKS LEANS ON THE TITLE OF A
SERIOUS HISTORY OF CRYPTOLOGY NAMED “THE CRYPTOGRAPHERS”, WRITTEN BY
DAVID KAHN AND PUBLISHED IN 1967. THIS BOOK CONTAINS 35 TALKS DEALING
WITH CRYPTOGRAPHY AS A WHOLE. THEY ARE ORGANIZED IN TOPICAL SECTION
NAMED: HISTORY; TECHNOLOGY – PAST, PRESENT, FUTURE; EFFICIENT
CRYPTOGRAPHIC IMPLEMENTATIONS; TREACHERY AND PERFIDY; INFORMATION
SECURITY; CRYPTANALYSIS; SIDE-CHANNEL ATTACKS; RANDOMNESS EMBEDDED
SYSTEM SECURITY; PUBLIC-KEY CRYPTOGRAPHY; AND MODELS AND PROTOCOLS.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Ryan, Peter Y. A. |
author2_role | edt |
author2_variant | p y a r pya pyar |
author_GND | (DE-588)133642437 |
author_facet | Ryan, Peter Y. A. |
building | Verbundindex |
bvnumber | BV043503863 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)978-3-662-49301-4 (ZDB-2-LNC)978-3-662-49301-4 (OCoLC)946150768 (DE-599)BVBBV043503863 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-49301-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04585nmm a2200817zcb4500</leader><controlfield tag="001">BV043503863</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160708 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160411s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662493014</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-49301-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662493007</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-49300-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-49301-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-662-49301-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)978-3-662-49301-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)946150768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043503863</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The New codebreakers</subfield><subfield code="b">Essays dedicated to David Kahn on the occasion of his 85th birthday</subfield><subfield code="c">edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XIV, 551 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9100</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4016928-5</subfield><subfield code="a">Festschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ryan, Peter Y. A.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kahn, David</subfield><subfield code="d">1930-2024</subfield><subfield code="0">(DE-588)133642437</subfield><subfield code="4">hnr</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9100</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9100</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028920208</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="l">BTU01</subfield><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="l">UBY01</subfield><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-49301-4</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4016928-5 Festschrift gnd-content |
genre_facet | Festschrift |
id | DE-604.BV043503863 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:27:27Z |
institution | BVB |
isbn | 9783662493014 9783662493007 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028920208 |
oclc_num | 946150768 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-523 |
owner_facet | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-523 |
physical | 1 Online-Ressource XIV, 551 Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2016 ZDB-2-LNC ZDB-2-LNC-2016 ZDB-2-LNC ZDB-2-LNC_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater Berlin Springer [2016] © 2016 1 Online-Ressource XIV, 551 Seiten Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science Volume 9100 0302-9743 Computer science Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Informatik (DE-588)4016928-5 Festschrift gnd-content Ryan, Peter Y. A. edt Kahn, David 1930-2024 (DE-588)133642437 hnr Lecture Notes in Computer Science 9100 (DE-604)BV014880109 9100 https://doi.org/10.1007/978-3-662-49301-4 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday Lecture Notes in Computer Science Computer science Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Informatik |
subject_GND | (DE-588)4016928-5 |
title | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday |
title_auth | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday |
title_exact_search | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday |
title_full | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater |
title_fullStr | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater |
title_full_unstemmed | The New codebreakers Essays dedicated to David Kahn on the occasion of his 85th birthday edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater |
title_short | The New codebreakers |
title_sort | the new codebreakers essays dedicated to david kahn on the occasion of his 85th birthday |
title_sub | Essays dedicated to David Kahn on the occasion of his 85th birthday |
topic | Computer science Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Informatik |
topic_facet | Computer science Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Informatik Festschrift |
url | https://doi.org/10.1007/978-3-662-49301-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920208&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT ryanpeterya thenewcodebreakersessaysdedicatedtodavidkahnontheoccasionofhis85thbirthday AT kahndavid thenewcodebreakersessaysdedicatedtodavidkahnontheoccasionofhis85thbirthday |