Cryptography: theory and practice
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press, Taylor & Francis Group
[2019]
|
Ausgabe: | Fourth edition |
Schriftenreihe: | Textbook in mathematics
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xvii, 580 Seiten Illustrationen, Diagramme |
ISBN: | 9781138197015 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043935485 | ||
003 | DE-604 | ||
005 | 20240814 | ||
007 | t | ||
008 | 161205s2019 a||| |||| 00||| eng d | ||
020 | |a 9781138197015 |c Hardback |9 978-1-138-19701-5 | ||
035 | |a (OCoLC)1055858509 | ||
035 | |a (DE-599)BVBBV043935485 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-188 |a DE-739 |a DE-29T |a DE-634 |a DE-573 |a DE-19 |a DE-92 |a DE-522 |a DE-11 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
100 | 1 | |a Stinson, Douglas R. |d 1956- |e Verfasser |0 (DE-588)124658814 |4 aut | |
245 | 1 | 0 | |a Cryptography |b theory and practice |c Douglas R. Stinson, Maura B. Paterson |
250 | |a Fourth edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press, Taylor & Francis Group |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a xvii, 580 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Textbook in mathematics | |
650 | 0 | 7 | |a Geheimschrift |0 (DE-588)4156317-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Geheimschrift |0 (DE-588)4156317-7 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Paterson, Maura B. |e Verfasser |0 (DE-588)122031885X |4 aut | |
775 | 0 | 8 | |i Äquivalent |n Druck-Ausgabe, Paperback |z 978-1-03-247604-9 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029344475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029344475 |
Datensatz im Suchindex
_version_ | 1807409907473842176 |
---|---|
adam_text |
Contents Preface 1 Introduction to Cryptography 1.1 1.2 1.3 1.4 1.5 2 xv Cryptosystems and BasicCryptographicTools. 1.1.1 Secret-key Cryptosystems. 1.1.2 Public-key Cryptosystems. 1.1.3 Block and Stream Ciphers. 1.1.4 Hybrid Cryptography. Message Integrity. 1.2.1 Message Authentication Codes. 1.2.2 Signature Schemes. 1.2.3 Nonrepudiation. 1.2.4 Certificates. 1.2.5 Hash Functions. Cryptographic Protocols. Security . Notes and References . 1 1 1 2 3 3 4 6 6 7 8 8 9 10 13 Classical Cryptography 15 2.1 15 17 20 22 26 27 32 34 38 40 42 45 48 49 51 51 Introduction: Some SimpleCryptosystems . 2.1.1 The Shift Cipher . 2.1.2 The Substitution Cipher. 2.1.3 The Affine Cipher. 2.1.4 The Vigenère Cipher. 2.1.5 The Hill
Cipher. 2.1.6 The Permutation Cipher. 2.1.7 Stream Ciphers. 2.2 Cryptanalysis. 2.2.1 Cryptanalysis of the Affine Cipher. 2.2.2 Cryptanalysis of the Substitution Cipher . 2.2.3 Cryptanalysis of the Vigenère Cipher. 2.2.4 Cryptanalysis of the Hill Cipher. 2.2.5 Cryptanalysis of the LFSR Stream Cipher. 2.3 Notes and References . Exercises.
viii Contents 3 Shannon's Theory, Perfect Secrecy, and the One-Time Pad 3.1 Introduction. 3.2 Elementary Probability Theory. 3.3 Perfect Secrecy . 3.4 Entropy . 3.4.1 Properties of Entropy. 3.5 Spurious Keys and Unicity Distance. 3.6 Notes and References . Exercises. 61 61 62 64 70 72 75 79 80 4 Block Ciphers and Stream Ciphers 4.1 Introduction. 4.2 Substitution-Permutation Networks. 4.3 Linear Cryptanalysis. 4.3.1 The Piling-up Lemma. 4.3.2 Linear Approximations of S-boxes. 4.3.3 A Linear Attack on an SPN. 4.4 Differential Cryptanalysis. 4.5 The Data Encryption Standard . 4.5.1 Description of DES. 4.5.2 Analysis of DES. 4.6 The Advanced Encryption
Standard. 4.6.1 Description of AES. 4.6.2 Analysis of AES. 4.7 Modes of Operation . 4.7.1 Padding Oracle Attack on CBC Mode. 4.8 Stream Ciphers . 4.8.1 Correlation Attack on a Combination Generator . . 4.8.2 Algebraic Attack on a Filter Generator. 4.8.3 Trivium . 4.9 Notes and References . Exercises. 83 83 84 89 89 91 94 98 105 105 107 109 110 115 116 120 122 123 127 130 131 131 5 Hash Functions and Message Authentication 5.1 Hash Functions and Data Integrity. 5.2 Security of Hash Functions . 5.2.1 The Random Oracle Model. 5.2.2 Algorithms in the Random Oracle Model. 5.2.3 Comparison of Security Criteria . 5.3 Iterated Hash Functions. 5.3.1 The Merkle-Damgård Construction . 5.3.2 Some Examples of Iterated Hash Functions. 5.4 The Sponge Construction . 5.4.1
SHA-3. 5.5 Message Authentication Codes. 137 137 139 140 142 146 148 151 156 157 160 161
Contents ix 5.5.1 Nested MACs and HMAC. 5.5.2 CBC-MAC. 5.5.3 Authenticated Encryption. 5.6 Unconditionally Secure MACs . 5.6.1 Strongly Universal Hash Families . 5.6.2 Optimality of Deception Probabilities. 5.7 Notes and References . Exercises. 163 166 167 170 173 175 177 178 6 The RSA Cryptosystem and Factoring Integers 6.1 Introduction to Public-key Cryptography. 6.2 More Number Theory . 6.2.1 The Euclidean Algorithm. 6.2.2 The Chinese Remainder Theorem . 6.2.3 Other Useful Facts. 6.3 The RSA Cryptosystem . 6.3.1 Implementing RSA. 6.4 Primality Testing . 6.4.1 Legendre and Jacobi Symbols. 6.4.2 The Solovay-Strassen Algorithm. 6.4.3 The Miller-Rabin Algorithm. 6.5 Square Roots Modulo n
. 6.6 Factoring Algorithms . 6.6.1 The Pollard p — 1 Algorithm . 6.6.2 The Pollard Rho Algorithm. 6.6.3 Dixon's Random Squares Algorithm. 6.6.4 Factoring Algorithms in Practice. 6.7 Other Attacks on RSA . 6.7.1 Computing ф{п) . 6.7.2 The Decryption Exponent. 6.7.3 Wiener's Low Decryption Exponent Attack. 6.8 The Rabin Cryptosystem . 6.8.1 Security of the Rabin Cryptosystem. 6.9 Semantic Security of RSA . 6.9.1 Partial Information Concerning Plaintext Bits . 6.9.2 Obtaining Semantic Security . 6.10 Notes and References . Exercises. 185 185 188 188 191 194 196 198 200 202 205 208 210 211 212 213 216 221 223 223 223 228 232 234 236 237 239 245 246 7 255 255 256 258 258 260 Public-Key Cryptography and Discrete Logarithms 7.1 Introduction. 7.1.1 The ElGamal
Cryptosystem. 7.2 Algorithms for the Discrete Logarithm Problem . 7.2.1 Shanks' Algorithm. 7.2.2 The Pollard Rho Discrete Logarithm Algorithm . .
x 8 9 Contents 7.2.3 The Pohlig-Hellman Algorithm. 7.2.4 The Index Calculus Method. 7.3 Lower Bounds on the Complexity of Generic Algorithms . 7.4 Finite Fields. 7.4.1 Joux's Index Calculus . 7.5 Elliptic Curves . 7.5.1 Elliptic Curves over the Reals. 7.5.2 Elliptic Curves Modulo a Prime. 7.5.3 Elliptic Curves over Finite Fields. 7.5.4 Properties of Elliptic Curves. 7.5.5 Pairings on Elliptic Curves . 7.5.6 ElGamal Cryptosystems on EllipticCurves. 7.5.7 Computing Point Multiples on Elliptic Curves . . . 7.6 Discrete Logarithm Algorithms in Practice . 7.7 Security of ElGamal Systems . 7.7.1 Bit Security of Discrete Logarithms. 7.7.2 Semantic Security of ElGamal Systems. 7.7.3 The Diffie-Hellman Problems. 7.8 Notes and References . Exercises. 263 266 268 272 276 278 278 281 284 285 286 290 292 294 296 296 299 300 301 302 Signature Schemes 309 8.1
Introduction. 8.1.1 RSA Signature Scheme. 8.2 Security Requirements for Signature Schemes . 8.2.1 Signatures and Hash Functions. 8.3 The ElGamal Signature Scheme. 8.3.1 Security of the ElGamal Signature Scheme . 8.4 Variants of the ElGamal Signature Scheme . 8.4.1 The Schnorr Signature Scheme. 8.4.2 The Digital Signature Algorithm. 8.4.3 The Elliptic Curve DSA. 8.5 Full Domain Hash . 8.6 Certificates . 8.7 Signing and Encrypting . 8.8 Notes and References . Exercises. 309 310 312 313 314 317 320 320 322 325 326 330 331 333 334 Post-Quantum Cryptography 341 9.1 Introduction. 9.2 Lattice-based Cryptography. 9.2.1 NTRU . 9.2.2 Lattices and the Security of NTRU. 9.2.3 Learning With Errors. 9.3
Code-based Cryptography and the McEliece Cryptosystem 341 344 344 348 351 353
Contents xi 9.4 Multivariate Cryptography. 9.4.1 Hidden Field Equations. 9.4.2 The Oil and Vinegar Signature Scheme . 9.5 Hash-based Signature Schemes. 9.5.1 Lamport Signature Scheme. 9.5.2 Winternitz Signature Scheme. 9.5.3 Merkle Signature Scheme. 9.6 Notes and References . Exercises. 358 359 364 367 368 370 373 376 376 10 Identification Schemes and Entity Authentication 10.1 Introduction. 10.1.1 Passwords. 10.1.2 Secure Identification Schemes. 10.2 Challenge-and-Response in the Secret-key Setting. 10.2.1 Attack Model and Adversarial Goals. 10.2.2 Mutual Authentication. 10.3 Challenge-and-Response in the Public-key Setting. 10.3.1 Public-key Identification Schemes. 10.4 The Schnorr Identification Scheme. 10.4.1 Security of the Schnorr Identification Scheme . . . . 10.5 The Feige-Fiat-Shamir Identification Scheme. 10.6 Notes and References
. Exercises. 379 379 381 383 384 389 391 394 394 397 400 406 411 412 11 Key Distribution 11.1 Introduction. 11.1.1 Attack Models and Adversarial Goals. 11.2 Key Predistribution. 11.2.1 Diffie-Hellman Key Predistribution. 11.2.2 The Blom Scheme. 11.2.3 Key Predistribution in Sensor Networks. 11.3 Session Key Distribution Schemes . 11.3.1 The Needham-Schroeder Scheme. 11.3.2 The Denning-Sacco Attack on the NS Scheme . . . . 11.3.3 Kerberos. 11.3.4 The Bellare-Rogaway Scheme. 11.4 Re-keying and the Logical Key Hierarchy. 11.5 Threshold Schemes. 11.5.1 The Shamir Scheme. 11.5.2 A Simplified (t,t)-threshold Scheme. 11.5.3 Visual Threshold Schemes. 11.6 Notes and References . Exercises. 415 415 418 419 419 421 428 432 432 433 435 438 441
444 445 448 450 454 454
xii Contents 12 Key Agreement Schemes 12.1 Introduction. 12.1.1 Transport Layer Security (TLS). 12.2 Diffie-Hellman Key Agreement. 12.2.1 The Station-to-station Key Agreement Scheme . 12.2.2 Security of STS. 12.2.3 Known Session Key Attacks. 12.3 Key Derivation Functions. 12.4 MTI Key Agreement Schemes. 12.4.1 Known Session Key Attacks on MTI/AO . 12.5 Deniable Key Agreement Schemes. 12.6 Key Updating. 12.7 Conference Key Agreement Schemes . 12.8 Notes and References . Exercises. 461 461 461 463 465 466 469 471 472 476 478 481 484 488 488 13 Miscellaneous Topics 13.1 Identity-based Cryptography. 13.1.1 The Cocks Identity-based Cryptosystem. 13.1.2 Boneh-Franklin Identity-based Cryptosystem . . . 13.2 The Paillier Cryptosystem. 13.3 Copyright
Protection. 13.3.1 Fingerprinting. 13.3.2 Identifiable Parent Property. 13.3.3 2-IPP Codes. 13.3.4 Tracing Illegally Redistributed Keys. 13.4 Bitcoin and Blockchain Technology . 13.5 Notes and References . Exercises. 491 491 492 498 503 506 507 509 511 514 518 522 523 A Number Theory and Algebraic Concepts for Cryptography A.l Modular Arithmetic . A.2 Groups. A.2.1 Orders of Group Elements. A.2.2 Cyclic Groups and Primitive Elements. A.2.3 Subgroups and Cosets. A.2.4 Group Isomorphisms and Homomorphisms . A.2.5 Quadratic Residues. A.2.6 Euclidean Algorithm. A.2.7 Direct Products. A.3 Rings. A.3.1 The Chinese Remainder Theorem
. A.3.2 Ideals and Quotient Rings. A.4 Fields. 527 527 528 530 531 532 533 534 535 536 536 538 539 540
Contents xiii В Pseudorandom Bit Generation for Cryptography B.l Bit Generators. B.2 Security of Pseudorandom Bit Generators. B.3 Notes and References . 543 543 548 550 Bibliography 551 Index 567 |
any_adam_object | 1 |
author | Stinson, Douglas R. 1956- Paterson, Maura B. |
author_GND | (DE-588)124658814 (DE-588)122031885X |
author_facet | Stinson, Douglas R. 1956- Paterson, Maura B. |
author_role | aut aut |
author_sort | Stinson, Douglas R. 1956- |
author_variant | d r s dr drs m b p mb mbp |
building | Verbundindex |
bvnumber | BV043935485 |
classification_rvk | ST 276 SK 170 |
ctrlnum | (OCoLC)1055858509 (DE-599)BVBBV043935485 |
discipline | Informatik Mathematik |
edition | Fourth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV043935485</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240814</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">161205s2019 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138197015</subfield><subfield code="c">Hardback</subfield><subfield code="9">978-1-138-19701-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1055858509</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043935485</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stinson, Douglas R.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)124658814</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography</subfield><subfield code="b">theory and practice</subfield><subfield code="c">Douglas R. Stinson, Maura B. Paterson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 580 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Textbook in mathematics</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="0">(DE-588)4156317-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Geheimschrift</subfield><subfield code="0">(DE-588)4156317-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paterson, Maura B.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122031885X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="775" ind1="0" ind2="8"><subfield code="i">Äquivalent</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-03-247604-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029344475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029344475</subfield></datafield></record></collection> |
id | DE-604.BV043935485 |
illustrated | Illustrated |
indexdate | 2024-08-15T00:06:47Z |
institution | BVB |
isbn | 9781138197015 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029344475 |
oclc_num | 1055858509 |
open_access_boolean | |
owner | DE-12 DE-188 DE-739 DE-29T DE-634 DE-573 DE-19 DE-BY-UBM DE-92 DE-522 DE-11 |
owner_facet | DE-12 DE-188 DE-739 DE-29T DE-634 DE-573 DE-19 DE-BY-UBM DE-92 DE-522 DE-11 |
physical | xvii, 580 Seiten Illustrationen, Diagramme |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
series2 | Textbook in mathematics |
spelling | Stinson, Douglas R. 1956- Verfasser (DE-588)124658814 aut Cryptography theory and practice Douglas R. Stinson, Maura B. Paterson Fourth edition Boca Raton ; London ; New York CRC Press, Taylor & Francis Group [2019] © 2019 xvii, 580 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Textbook in mathematics Geheimschrift (DE-588)4156317-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Geheimschrift (DE-588)4156317-7 s Paterson, Maura B. Verfasser (DE-588)122031885X aut Äquivalent Druck-Ausgabe, Paperback 978-1-03-247604-9 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029344475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stinson, Douglas R. 1956- Paterson, Maura B. Cryptography theory and practice Geheimschrift (DE-588)4156317-7 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4156317-7 (DE-588)4033329-2 |
title | Cryptography theory and practice |
title_auth | Cryptography theory and practice |
title_exact_search | Cryptography theory and practice |
title_full | Cryptography theory and practice Douglas R. Stinson, Maura B. Paterson |
title_fullStr | Cryptography theory and practice Douglas R. Stinson, Maura B. Paterson |
title_full_unstemmed | Cryptography theory and practice Douglas R. Stinson, Maura B. Paterson |
title_short | Cryptography |
title_sort | cryptography theory and practice |
title_sub | theory and practice |
topic | Geheimschrift (DE-588)4156317-7 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Geheimschrift Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029344475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stinsondouglasr cryptographytheoryandpractice AT patersonmaurab cryptographytheoryandpractice |