Foundations of cryptography, 2, Basic applications:
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issue...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
[2004]
|
Schlagworte: | |
Online-Zugang: | DE-12 DE-92 DE-706 DE-739 URL des Erstveröffentlichers |
Zusammenfassung: | Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful |
Beschreibung: | 1 online resource (xxii, pages 373-798) |
ISBN: | 9780511721656 |
DOI: | 10.1017/CBO9780511721656 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043945957 | ||
003 | DE-604 | ||
005 | 20240513 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2004 |||| o||u| ||||||eng d | ||
020 | |a 9780511721656 |c Online |9 978-0-511-72165-6 | ||
024 | 7 | |a 10.1017/CBO9780511721656 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511721656 | ||
035 | |a (OCoLC)967699994 | ||
035 | |a (DE-599)BVBBV043945957 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 |a DE-739 |a DE-706 | ||
082 | 0 | |a 652/.8 |2 21 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Goldreich, Oded |d 1957- |e Verfasser |0 (DE-588)120549255 |4 aut | |
245 | 1 | 0 | |a Foundations of cryptography, 2, Basic applications |c Oded Goldreich |
246 | 1 | 3 | |a Foundations of cryptography |
264 | 1 | |a Cambridge |b Cambridge University Press |c [2004] | |
300 | |a 1 online resource (xxii, pages 373-798) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful | ||
610 | 2 | 7 | |a Gothaer Lebensversicherung AG |0 (DE-588)10108596-5 |2 gnd |9 rswk-swf |
650 | 4 | |a Mathematik | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Cryptography / Mathematics | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
651 | 7 | |a Abrahám |g Slowakei |0 (DE-588)4000185-4 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Gothaer Lebensversicherung AG |0 (DE-588)10108596-5 |D b |
689 | 1 | 1 | |a Abrahám |g Slowakei |0 (DE-588)4000185-4 |D g |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-521-83084-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-521-11991-7 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511721656 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
966 | e | |u https://doi.org/10.1017/CBO9780511721656 |l DE-12 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511721656 |l DE-92 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511721656 |l DE-706 |p ZDB-20-CBO |q UBY_PDA_CBO_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511721656 |l DE-739 |p ZDB-20-CBO |q UPA_PDA_CBO_Kauf2019 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805067391114149888 |
---|---|
adam_text | |
any_adam_object | |
author | Goldreich, Oded 1957- |
author_GND | (DE-588)120549255 |
author_facet | Goldreich, Oded 1957- |
author_role | aut |
author_sort | Goldreich, Oded 1957- |
author_variant | o g og |
building | Verbundindex |
bvnumber | BV043945957 |
classification_rvk | SK 170 ST 273 ST 276 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9780511721656 (OCoLC)967699994 (DE-599)BVBBV043945957 |
dewey-full | 652/.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652/.8 |
dewey-search | 652/.8 |
dewey-sort | 3652 18 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Mathematik Wirtschaftswissenschaften |
doi_str_mv | 10.1017/CBO9780511721656 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV043945957</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240513</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511721656</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-72165-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511721656</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511721656</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967699994</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043945957</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652/.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Goldreich, Oded</subfield><subfield code="d">1957-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)120549255</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations of cryptography, 2, Basic applications</subfield><subfield code="c">Oded Goldreich</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Foundations of cryptography</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">[2004]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, pages 373-798)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful</subfield></datafield><datafield tag="610" ind1="2" ind2="7"><subfield code="a">Gothaer Lebensversicherung AG</subfield><subfield code="0">(DE-588)10108596-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography / Mathematics</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Abrahám</subfield><subfield code="g">Slowakei</subfield><subfield code="0">(DE-588)4000185-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Gothaer Lebensversicherung AG</subfield><subfield code="0">(DE-588)10108596-5</subfield><subfield code="D">b</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Abrahám</subfield><subfield code="g">Slowakei</subfield><subfield code="0">(DE-588)4000185-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-521-83084-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-521-11991-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511721656</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511721656</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511721656</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511721656</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBY_PDA_CBO_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511721656</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UPA_PDA_CBO_Kauf2019</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | Abrahám Slowakei (DE-588)4000185-4 gnd |
geographic_facet | Abrahám Slowakei |
id | DE-604.BV043945957 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T03:33:30Z |
institution | BVB |
isbn | 9780511721656 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029354928 |
oclc_num | 967699994 |
open_access_boolean | |
owner | DE-12 DE-92 DE-739 DE-706 |
owner_facet | DE-12 DE-92 DE-739 DE-706 |
physical | 1 online resource (xxii, pages 373-798) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO ZDB-20-CBO UBY_PDA_CBO_Kauf ZDB-20-CBO UPA_PDA_CBO_Kauf2019 |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Goldreich, Oded 1957- Verfasser (DE-588)120549255 aut Foundations of cryptography, 2, Basic applications Oded Goldreich Foundations of cryptography Cambridge Cambridge University Press [2004] 1 online resource (xxii, pages 373-798) txt rdacontent c rdamedia cr rdacarrier Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful Gothaer Lebensversicherung AG (DE-588)10108596-5 gnd rswk-swf Mathematik Coding theory Cryptography / Mathematics Kryptologie (DE-588)4033329-2 gnd rswk-swf Abrahám Slowakei (DE-588)4000185-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Gothaer Lebensversicherung AG (DE-588)10108596-5 b Abrahám Slowakei (DE-588)4000185-4 g Erscheint auch als Druck-Ausgabe, Hardcover 978-0-521-83084-3 Erscheint auch als Druck-Ausgabe, Paperback 978-0-521-11991-7 https://doi.org/10.1017/CBO9780511721656 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Goldreich, Oded 1957- Foundations of cryptography, 2, Basic applications Gothaer Lebensversicherung AG (DE-588)10108596-5 gnd Mathematik Coding theory Cryptography / Mathematics Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)10108596-5 (DE-588)4033329-2 (DE-588)4000185-4 |
title | Foundations of cryptography, 2, Basic applications |
title_alt | Foundations of cryptography |
title_auth | Foundations of cryptography, 2, Basic applications |
title_exact_search | Foundations of cryptography, 2, Basic applications |
title_full | Foundations of cryptography, 2, Basic applications Oded Goldreich |
title_fullStr | Foundations of cryptography, 2, Basic applications Oded Goldreich |
title_full_unstemmed | Foundations of cryptography, 2, Basic applications Oded Goldreich |
title_short | Foundations of cryptography, 2, Basic applications |
title_sort | foundations of cryptography 2 basic applications |
topic | Gothaer Lebensversicherung AG (DE-588)10108596-5 gnd Mathematik Coding theory Cryptography / Mathematics Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Gothaer Lebensversicherung AG Mathematik Coding theory Cryptography / Mathematics Kryptologie Abrahám Slowakei |
url | https://doi.org/10.1017/CBO9780511721656 |
work_keys_str_mv | AT goldreichoded foundationsofcryptography2basicapplications AT goldreichoded foundationsofcryptography |