The Design of Rijndael: The Advanced Encryption Standard (AES)
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2020
Berlin, Heidelberg Springer |
Ausgabe: | Second Edition |
Schriftenreihe: | Information Security and Cryptography
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 TUM01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XVIII, 282 p. 49 illus) |
ISBN: | 9783662607695 |
ISSN: | 1619-7100 |
DOI: | 10.1007/978-3-662-60769-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046747117 | ||
003 | DE-604 | ||
005 | 20200825 | ||
007 | cr|uuu---uuuuu | ||
008 | 200604s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783662607695 |c Online |9 978-3-662-60769-5 | ||
024 | 7 | |a 10.1007/978-3-662-60769-5 |2 doi | |
035 | |a (ZDB-2-SCS)9783662607695 | ||
035 | |a (OCoLC)1164635089 | ||
035 | |a (DE-599)BVBBV046747117 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-860 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-355 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-91 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465p |2 stub | ||
100 | 1 | |a Daemen, Joan |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Design of Rijndael |b The Advanced Encryption Standard (AES) |c by Joan Daemen, Vincent Rijmen |
250 | |a Second Edition | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2020 | |
264 | 1 | |a Berlin, Heidelberg |b Springer | |
300 | |a 1 Online-Ressource (XVIII, 282 p. 49 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information Security and Cryptography |x 1619-7100 | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Principles and Models of Security | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer security | |
650 | 4 | |a System safety | |
650 | 0 | 7 | |a Data Encryption Standard |0 (DE-588)4340509-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Data Encryption Standard |0 (DE-588)4340509-5 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Rijmen, Vincent |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-662-60768-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-662-60770-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-662-60771-8 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-60769-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2020_Fremddaten | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032156905 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FWS01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l FWS02 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l TUM01 |p ZDB-2-SCS |q TUM_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-60769-5 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 759924 |
---|---|
_version_ | 1824554962433081344 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Daemen, Joan Rijmen, Vincent |
author_facet | Daemen, Joan Rijmen, Vincent |
author_role | aut aut |
author_sort | Daemen, Joan |
author_variant | j d jd v r vr |
building | Verbundindex |
bvnumber | BV046747117 |
classification_rvk | ST 276 |
classification_tum | DAT 000 DAT 465p |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783662607695 (OCoLC)1164635089 (DE-599)BVBBV046747117 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-662-60769-5 |
edition | Second Edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04365nmm a2200853zc 4500</leader><controlfield tag="001">BV046747117</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200825 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200604s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662607695</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-60769-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-60769-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783662607695</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164635089</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046747117</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465p</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Daemen, Joan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Design of Rijndael</subfield><subfield code="b">The Advanced Encryption Standard (AES)</subfield><subfield code="c">by Joan Daemen, Vincent Rijmen</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second Edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 282 p. 49 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Security and Cryptography</subfield><subfield code="x">1619-7100</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Principles and Models of Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rijmen, Vincent</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-662-60768-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-662-60770-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-662-60771-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020_Fremddaten</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032156905</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-60769-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046747117 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:41:01Z |
indexdate | 2025-02-20T07:00:06Z |
institution | BVB |
isbn | 9783662607695 |
issn | 1619-7100 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032156905 |
oclc_num | 1164635089 |
open_access_boolean | |
owner | DE-573 DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-M347 DE-703 DE-706 DE-739 DE-634 DE-91 DE-BY-TUM |
owner_facet | DE-573 DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-M347 DE-703 DE-706 DE-739 DE-634 DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (XVIII, 282 p. 49 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2020_Fremddaten ZDB-2-SCS TUM_Einzelkauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer Berlin Heidelberg Springer |
record_format | marc |
series2 | Information Security and Cryptography |
spellingShingle | Daemen, Joan Rijmen, Vincent The Design of Rijndael The Advanced Encryption Standard (AES) Cryptology Principles and Models of Security Systems and Data Security Security Science and Technology Data encryption (Computer science) Computer security System safety Data Encryption Standard (DE-588)4340509-5 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd |
subject_GND | (DE-588)4340509-5 (DE-588)4680201-0 |
title | The Design of Rijndael The Advanced Encryption Standard (AES) |
title_auth | The Design of Rijndael The Advanced Encryption Standard (AES) |
title_exact_search | The Design of Rijndael The Advanced Encryption Standard (AES) |
title_exact_search_txtP | The Design of Rijndael The Advanced Encryption Standard (AES) |
title_full | The Design of Rijndael The Advanced Encryption Standard (AES) by Joan Daemen, Vincent Rijmen |
title_fullStr | The Design of Rijndael The Advanced Encryption Standard (AES) by Joan Daemen, Vincent Rijmen |
title_full_unstemmed | The Design of Rijndael The Advanced Encryption Standard (AES) by Joan Daemen, Vincent Rijmen |
title_short | The Design of Rijndael |
title_sort | the design of rijndael the advanced encryption standard aes |
title_sub | The Advanced Encryption Standard (AES) |
topic | Cryptology Principles and Models of Security Systems and Data Security Security Science and Technology Data encryption (Computer science) Computer security System safety Data Encryption Standard (DE-588)4340509-5 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd |
topic_facet | Cryptology Principles and Models of Security Systems and Data Security Security Science and Technology Data encryption (Computer science) Computer security System safety Data Encryption Standard Advanced Encryption Standard |
url | https://doi.org/10.1007/978-3-662-60769-5 |
work_keys_str_mv | AT daemenjoan thedesignofrijndaeltheadvancedencryptionstandardaes AT rijmenvincent thedesignofrijndaeltheadvancedencryptionstandardaes |