Introduction to cryptography:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2018]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Auf dem Cover: "confidentiality, entity authentification, non-repudiation, data origin authentification, data integrity, encryption, identification, signature, MAC, hash function, cryptography" |
Beschreibung: | xv, 251 Seiten Illustrationen, Diagramme |
ISBN: | 9781138071537 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045250877 | ||
003 | DE-604 | ||
005 | 20190627 | ||
007 | t | ||
008 | 181025s2018 xxua||| |||| 00||| eng d | ||
010 | |a 018002460 | ||
020 | |a 9781138071537 |c hbk. |9 978-1-138-07153-7 | ||
035 | |a (OCoLC)1037945882 | ||
035 | |a (DE-599)BVBBV045250877 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 |a DE-20 |a DE-11 |a DE-83 | ||
050 | 0 | |a QA268 | |
082 | 0 | |a 003/.54 |2 23 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Padhye, Sahadeo |0 (DE-588)1173988033 |4 aut | |
245 | 1 | 0 | |a Introduction to cryptography |c Sahadeo Padhye (Associate Professor, Department of Mathematics, Motilal Nehru National Institute of Technology, Allahabad, India), Rajeev Anand Sahu (Post-Doctoral Researcher, Departement d'Informatique, Université Libre de Bruxelles (ULB) Brussels, Belgium), Vishal Saraswat (Visiting Scientist, R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India) |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xv, 251 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Auf dem Cover: "confidentiality, entity authentification, non-repudiation, data origin authentification, data integrity, encryption, identification, signature, MAC, hash function, cryptography" | ||
650 | 4 | |a Cryptography |x Mathematics | |
650 | 4 | |a Number theory | |
650 | 4 | |a Algorithms | |
650 | 0 | 7 | |a Algorithmus |0 (DE-588)4001183-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zahlentheorie |0 (DE-588)4067277-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Zahlentheorie |0 (DE-588)4067277-3 |D s |
689 | 0 | 2 | |a Algorithmus |0 (DE-588)4001183-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sahu, Rajeev A. |d ca. 20./21. Jhr. |e Verfasser |0 (DE-588)1173989676 |4 aut | |
700 | 1 | |a Saraswat, Vishal |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030638888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030638888 |
Datensatz im Suchindex
_version_ | 1804178994486050816 |
---|---|
adam_text | Contents Dedication iii Foreword v Preface 1 Overview of Cryptography 1.1 Introduction 1.2 Goals of Cryptography 1.3 Classification of Cryptosystem 1.4 Practically Usefiil Cryptosystem 1.4.1 ConfUsion and Diffusion 1.5 Cryptanalysis 1.5.1 Types of Attackers 1.5.2 Types of Attacks 1.5.3 Security Notions vii 1 2 3 4 5 6 7 7 8 9 2 Basic Algebra 11 2.1 Group 2.2 Ring 2.3 Field 2.3.1 2.3.2 2.3.3 2.3.4 12 15 16 17 18 19 19 20 22 23 Finite Field Field Construction Field Construction using Irreducible Polynomial Galois Field GF(2 ) 2.3.4.1 Integer Representation of Finite Field Elements 2.3.5 Field Construction using Generator 2.4 Exercises
x ■ Introduction to Cryptography 3 Number Theory 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 Prime Numbers Cardinality of Primes Extended Euclidean Algorithm Congruences 3.4.1 Solving Linear Congruence in Zn 3.4.2 Chinese Remainder Theorem (CRT) Integer Factorization Problem 3.5.1 Trial Division Method 3.5.2 Fermat’s Method 3.5.3 Pollard’s p ֊ 1 Method 3.5.4 Pollard’s Rho Method 3.5.5 Quadratic Sieve 3.5.6 Number Field Sieve Primality Testing 3.6.1 Sieve of Eratosthenes 3.6.2 Divisibility Algorithm 3.6.3 AKS Algorithm 3.6.4 Fermat Test 3.6.5 Miller-Rabin Algorithm Quadratic Congruence 3.7.1 Quadratic Residue or Non-Residue 3.7.2 Legendre Symbol and Jacobi Symbol Exponentiation and Logarithm 3.8.1 Square and Multiply Method Discrete Logarithm Problem 3.9.1 Shank’s Baby-Step Giant-Step Algorithm 3.9.2 Pollard’s Rho Algorithm 3.9.3 Pohlig-Hellman Algorithm 3.9.4 Index Calculus Algorithm Exercises 4 Probability and Perfect Secrecy 4.1 4.2 4.3 4.4 4.5 4.6 4.7 Basic Concept of Probability Birthday Paradox Perfect Secrecy Vernam One-Time Pad Random Number Generation Pseudo-random Number Generator Exercises 25 26 27 29 32 33 34 35 35 36 37 39 40 41 41 41 42 42 43 43 45 45 46 50 50 51 52 53 56 58 59 61 62 64 66 68 69 69 70
Contents 5 Complexity Theory 5.1 Running Time and Size of Input 5.2 Big-O Notation 5.2.1 Big-Ć2 and Growth Rate 5.2.2 Properties of Order Notation 5.3 Types of Algorithm 5.4 Complexity Classes 5.5 Exercises 6 Classical Cryptosystems 6.1 Classification of Classical Cryptosystem 6.2 Block Cipher 6.2.1 Substitution Cipher 6.2.1.1 Shift Cipher 6.2.1.2 Affine Cipher 6.2.1.3 Substitution Cipher 6.2.1.4 Vigenere Cipher 6.2.1.5 Hill Cipher 6.2.2 Transposition Cipher 6.2.2.1 Scytale Ó.2.2.2 The Rail Fence Cipher 6.3 Stream Cipher 6.3.1 Synchronous Stream Cipher 6.3.1.1 Vigenere Cipher as Synchronous Stream Cipher 6.3.2 Linear Feedback Shift Register (LFSR) 6.3.3 Non-Synchronous Stream Cipher 6.3.3.1 Autokey Cipher 6.4 Cryptanalysis of Cryptosystems 6.4.1 Frequency Analysis 6.4.2 Cryptanalysis of Affine Cipher 6.4.3 Cryptanalysis of Substitution Cipher 6.4.4 Cryptanalysis of Vigenere Cipher 6.4.5 Cryptanalysis of Hill Cipher 6.4.6 Cryptanalysis of LFSR Stream Cipher 6.5 Exercises 7 Block Ciphers 7.1 Introduction 7.1.1 Notations 7.2 Modes of Operation 7.2.1 Electronic Code Book (ECB) 7.2.1.1 ECB Properties ■ xi 73 74 75 75 76 78 79 82 85 86 87 87 87 89 90 90 92 93 95 95 96 96 97 98 99 100 101 101 102 104 105 109 110 112 115 116 117 117 118 119
xii M Introduction to Cryptography 7.2.2 7.3 7.4 7.5 7.6 7.7 Cipher-Block Chaining (CBC) 7.2.2.1 CBC Properties 7.2.3 Cipher FeedBack (CFB) 7.2.3.1 CFB Properties 7.2.4 Output FeedBack (OFB) 7.2.4.1 OFB Properties 7.2.5 Counter (CTR) Padding 7.3.1 Ciphertext Stealing 7.3.1.1 Ciphertext Stealing (ECB mode) 7.3.1.2 Ciphertext Stealing (CBC mode) Design Considerations 7.4.1 Diffusion 7.4.2 Confusion 7.4.3 Avalanche Effect 7.4.4 Basic Design Considerations Data Encryption Standard (DES) 7.5.1 The Mangier Function ƒ 7.5.2 The fľ-boxes 7.5.3 Key Schedule 7.5.4 DES Variants 7.5.5 DESX 7.5.6 TDES Advanced Encryption Standard (AES) 7.6.1 Role of GF(28) in AES 7.6.2 Basic Steps 7.6.3 Basic Structure 7.6.4 AES-Key Schedule 7.6.5 AES-Decryption Exercises 8 Hash Function 8.1 Compression and Hash Functions 8.1.1 Compression Function 8.1.2 Computable Map 8.! .3 Hash Function 8.1.4 Additional Properties 8.2 Hash Function for Cryptography 8.2.1 Security Aspects of Communication 8.2.2 Modification Detection Code (MDC) 120 120 121 122 123 124 125 126 126 127 127 128 128 128 129 129 130 132 132 133 134 134 134 135 136 136 139 139 141 141 143 144 144 144 144 145 146 146 147
Contents 8.2.3 Message Authentication Codes (MAC) 8.2.3.1 MAC Algorithm 8.2.3.2 Security of MAC 8.2.3.3 HMAC 8.2.3.4 HMAC Algorithm 8.2.3.5 Limitations of MAC 8.2.4 Digital Signature 8.3 Random Oracle Model 8.4 Cryptographic Hash Functions 8.4.1 Iterated Hash Function 8.4.2 Merkle-Damgàrd Hash Function 8.4.3 MD5 8.4.3.1 Working Principle of MD5 8.4.3.2 Attacks on MD5 8.4.4 SHA-1 8.4.4.1 Working Principle of SHA-1 8.4.4.2 Example 8.4.4.3 Attacks on SHA-1 8.5 Exercises 9 Public Key Cryptosystem 9.1 Introduction 9.1.1 Symmetric Key Cryptosystem vs Public Key Cryptosystem 9.2 Diffie-Hellman Key Exchange Protocol 9.2.1 The Man-in-the-Middle Attack 9.2.2 CDH Assumption DL Assumption 9.2.2.1 Relation between CDH Assumption DL Assumption 9.3 RS A Cryptosystem 9.3.1 RSA as a Block Cipher 9.3.2 RSA Assumption and RSA Problem 9.3.3 Cryptanalytic Attacks on RSA 9.3.3.1 Factoring Attack 9.3.3.2 Secrete Key and Factoring 9.3.3.3 Computing φ{ή) 9.3.3.4 Common Modulus Attack 9.3.3.5 Low Encryption Exponent Attack 9.3.3.6 Small Decryption Exponent Attack 9.3.3.7 Meet-in-the-Middle Attack 9.3.3.8 Forward Search Attack ■ xiii 147 148 148 150 150 151 151 152 152 152 153 155 155 156 156 157 158 162 163 165 167 168 169 171 171 172 173 174 175 176 176 176 179 179 180 180 181 181
xiv ■ Introduction to Cryptography 9.4 9.5 9.6 9.7 9.3.3.9 Cyclic Attack 9.3.3.10 Partial Key Exposure Attack 9.3.3.11 Timing Attack 9.3.4 RSA in Practice 9.3.4.1 Recommended Size of Modulus 9.3.4.2 Selecting Primes 9.3.4.3 Choice of e and d 9.3.5 Efficiency of RSA 9.3.5.1 RSA with CRT 9.3.6 Semantic Security of RSA 9.3.6.1 Secure RSA (RSA-OAEP) Rabin Cryptosystem 9.4.1 Efficiency of Rabin Cryptosystem 9.4.2 Cryptanalysis of Rabin Cryptosystem 9.4.2.1 Security against Ciphertext Only Attack 9.4.2.2 Security of Rabin against CCA ElGamal Cryptosystem 9.5.1 Correctness of Decryption 9.5.2 Efficiency 9.5.3 ElGamal and Diffie-Hellman 9.5.4 Semantic Security of ElGamal 9.5.5 Malleablity of ElGamal Cryptosystem Elliptic Curve Cryptosystem 9.6.0.1 Elliptic Curve over a Field Fp 9.6.1 Addition Operation of Elliptic Curve E(a, b) over F (Chord and Tangent Method) 9.6.1.1 Geometrical Explanation of the Addition Operation 9.6.2 Elliptic Curves over GF(2 ) 9.6.2.1 Addition Law of Elliptic Curve E(a, b) over F2n 9.6.3 Elliptic Curve Cryptosystem 9.6.3.1 Elliptic Curve DH Protocol (ECDHP) 9.6.3.2 Elliptic Curve based ElGamal Cryptosystem 9.6.3.3 Advantages and Disadvantages of ECC over RSA Exercises 10 Digital Signature 10.1 Formal Definitions 10.1.1 Basic Elements of Digital Signature 10.1.2 Formal Structure 10.1.3 Digital Signature Scheme 182 182 182 182 182 182 183 183 183 184 185 186 188 188 188 189 189 190 190 191 191 192 192 193 193 194 197 197 198 199 199 200 201 205 206 206 206 207
Contents 10.2 Attack Goals of an Adversary of a Digital Signature 10.3 Digital Signature in Practice 10.3.1 RSA Signature 10.3.1.1 Security of RSA Signature 10.3.1.2 Performance 10.3.2 ElGamal Signature 10.3.2.1 Security of ElGamal Signature 10.3.2.2 RSA vs ElGamal Signature 10.3.3 Digital Signature Algorithm (DSA) 10.3.3.1 Security of DSA 10.3.3.2 ElGamal vs DSA 10.3.4 Elliptic Curve Digital Signature Algorithm (ECDSA) 10.3.4.1 Security of ECDS A 10.3.4.2 Why ECDSA over other Signatures? 10.3.4.3 Application of ECDSA 10.3.4.4 Issues with ECDSA 10.4 Some Popular Digital Signatures 10.5 Exercises 11 Research Directions in Cryptography 11.1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 Pairing-based Cryptography Zero-knowledge Proof System Authenticated Group Key Exchange Attribute-based Cryptography Homomorphic Encryption Secure Multi-party Computation Secret Sharing Post-Quantum Cryptography Side-Channel Analysis ■ XV 208 209 209 210 211 211 213 215 215 217 217 217 219 220 220 220 221 222 223 224 225 226 227 228 229 229 230 231 References 233 Index 247
|
any_adam_object | 1 |
author | Padhye, Sahadeo Sahu, Rajeev A. ca. 20./21. Jhr Saraswat, Vishal |
author_GND | (DE-588)1173988033 (DE-588)1173989676 |
author_facet | Padhye, Sahadeo Sahu, Rajeev A. ca. 20./21. Jhr Saraswat, Vishal |
author_role | aut aut aut |
author_sort | Padhye, Sahadeo |
author_variant | s p sp r a s ra ras v s vs |
building | Verbundindex |
bvnumber | BV045250877 |
callnumber-first | Q - Science |
callnumber-label | QA268 |
callnumber-raw | QA268 |
callnumber-search | QA268 |
callnumber-sort | QA 3268 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 276 |
ctrlnum | (OCoLC)1037945882 (DE-599)BVBBV045250877 |
dewey-full | 003/.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003/.54 |
dewey-search | 003/.54 |
dewey-sort | 13 254 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02453nam a2200505 c 4500</leader><controlfield tag="001">BV045250877</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190627 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">181025s2018 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">018002460</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138071537</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-138-07153-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037945882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045250877</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA268</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003/.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Padhye, Sahadeo</subfield><subfield code="0">(DE-588)1173988033</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cryptography</subfield><subfield code="c">Sahadeo Padhye (Associate Professor, Department of Mathematics, Motilal Nehru National Institute of Technology, Allahabad, India), Rajeev Anand Sahu (Post-Doctoral Researcher, Departement d'Informatique, Université Libre de Bruxelles (ULB) Brussels, Belgium), Vishal Saraswat (Visiting Scientist, R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 251 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: "confidentiality, entity authentification, non-repudiation, data origin authentification, data integrity, encryption, identification, signature, MAC, hash function, cryptography"</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="x">Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Algorithmus</subfield><subfield code="0">(DE-588)4001183-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zahlentheorie</subfield><subfield code="0">(DE-588)4067277-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zahlentheorie</subfield><subfield code="0">(DE-588)4067277-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Algorithmus</subfield><subfield code="0">(DE-588)4001183-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sahu, Rajeev A.</subfield><subfield code="d">ca. 20./21. Jhr.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1173989676</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saraswat, Vishal</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030638888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030638888</subfield></datafield></record></collection> |
id | DE-604.BV045250877 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:12:49Z |
institution | BVB |
isbn | 9781138071537 |
language | English |
lccn | 018002460 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030638888 |
oclc_num | 1037945882 |
open_access_boolean | |
owner | DE-739 DE-20 DE-11 DE-83 |
owner_facet | DE-739 DE-20 DE-11 DE-83 |
physical | xv, 251 Seiten Illustrationen, Diagramme |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | CRC Press |
record_format | marc |
spelling | Padhye, Sahadeo (DE-588)1173988033 aut Introduction to cryptography Sahadeo Padhye (Associate Professor, Department of Mathematics, Motilal Nehru National Institute of Technology, Allahabad, India), Rajeev Anand Sahu (Post-Doctoral Researcher, Departement d'Informatique, Université Libre de Bruxelles (ULB) Brussels, Belgium), Vishal Saraswat (Visiting Scientist, R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India) Boca Raton ; London ; New York CRC Press [2018] © 2018 xv, 251 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Auf dem Cover: "confidentiality, entity authentification, non-repudiation, data origin authentification, data integrity, encryption, identification, signature, MAC, hash function, cryptography" Cryptography Mathematics Number theory Algorithms Algorithmus (DE-588)4001183-5 gnd rswk-swf Zahlentheorie (DE-588)4067277-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Zahlentheorie (DE-588)4067277-3 s Algorithmus (DE-588)4001183-5 s DE-604 Sahu, Rajeev A. ca. 20./21. Jhr. Verfasser (DE-588)1173989676 aut Saraswat, Vishal Verfasser aut Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030638888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Padhye, Sahadeo Sahu, Rajeev A. ca. 20./21. Jhr Saraswat, Vishal Introduction to cryptography Cryptography Mathematics Number theory Algorithms Algorithmus (DE-588)4001183-5 gnd Zahlentheorie (DE-588)4067277-3 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4001183-5 (DE-588)4067277-3 (DE-588)4033329-2 |
title | Introduction to cryptography |
title_auth | Introduction to cryptography |
title_exact_search | Introduction to cryptography |
title_full | Introduction to cryptography Sahadeo Padhye (Associate Professor, Department of Mathematics, Motilal Nehru National Institute of Technology, Allahabad, India), Rajeev Anand Sahu (Post-Doctoral Researcher, Departement d'Informatique, Université Libre de Bruxelles (ULB) Brussels, Belgium), Vishal Saraswat (Visiting Scientist, R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India) |
title_fullStr | Introduction to cryptography Sahadeo Padhye (Associate Professor, Department of Mathematics, Motilal Nehru National Institute of Technology, Allahabad, India), Rajeev Anand Sahu (Post-Doctoral Researcher, Departement d'Informatique, Université Libre de Bruxelles (ULB) Brussels, Belgium), Vishal Saraswat (Visiting Scientist, R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India) |
title_full_unstemmed | Introduction to cryptography Sahadeo Padhye (Associate Professor, Department of Mathematics, Motilal Nehru National Institute of Technology, Allahabad, India), Rajeev Anand Sahu (Post-Doctoral Researcher, Departement d'Informatique, Université Libre de Bruxelles (ULB) Brussels, Belgium), Vishal Saraswat (Visiting Scientist, R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India) |
title_short | Introduction to cryptography |
title_sort | introduction to cryptography |
topic | Cryptography Mathematics Number theory Algorithms Algorithmus (DE-588)4001183-5 gnd Zahlentheorie (DE-588)4067277-3 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptography Mathematics Number theory Algorithms Algorithmus Zahlentheorie Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030638888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT padhyesahadeo introductiontocryptography AT sahurajeeva introductiontocryptography AT saraswatvishal introductiontocryptography |