Introduction to Cryptography: Principles and Applications
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book cover...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2002
|
Ausgabe: | 1st ed. 2002 |
Schriftenreihe: | Information Security and Cryptography
|
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks |
Beschreibung: | 1 Online-Ressource (XIV, 310 p) |
ISBN: | 9783642871269 |
DOI: | 10.1007/978-3-642-87126-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064267 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2002 |||| o||u| ||||||eng d | ||
020 | |a 9783642871269 |9 978-3-642-87126-9 | ||
024 | 7 | |a 10.1007/978-3-642-87126-9 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-642-87126-9 | ||
035 | |a (OCoLC)1227482851 | ||
035 | |a (DE-599)BVBBV047064267 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Delfs, Hans |e Verfasser |4 aut | |
245 | 1 | 0 | |a Introduction to Cryptography |b Principles and Applications |c by Hans Delfs, Helmut Knebl |
250 | |a 1st ed. 2002 | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2002 | |
300 | |a 1 Online-Ressource (XIV, 310 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information Security and Cryptography | |
520 | |a Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Information theory | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Knebl, Helmut |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642871283 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783540781141 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783540422785 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642871276 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-87126-9 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471379 | ||
966 | e | |u https://doi.org/10.1007/978-3-642-87126-9 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062054244352 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Delfs, Hans Knebl, Helmut |
author_facet | Delfs, Hans Knebl, Helmut |
author_role | aut aut |
author_sort | Delfs, Hans |
author_variant | h d hd h k hk |
building | Verbundindex |
bvnumber | BV047064267 |
classification_rvk | ST 273 ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-642-87126-9 (OCoLC)1227482851 (DE-599)BVBBV047064267 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-642-87126-9 |
edition | 1st ed. 2002 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04079nmm a2200685zc 4500</leader><controlfield tag="001">BV047064267</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642871269</subfield><subfield code="9">978-3-642-87126-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-87126-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-642-87126-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227482851</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064267</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Delfs, Hans</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to Cryptography</subfield><subfield code="b">Principles and Applications</subfield><subfield code="c">by Hans Delfs, Helmut Knebl</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2002</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 310 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Security and Cryptography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Knebl, Helmut</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642871283</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783540781141</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783540422785</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642871276</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-87126-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471379</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-87126-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064267 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9783642871269 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471379 |
oclc_num | 1227482851 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XIV, 310 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series2 | Information Security and Cryptography |
spelling | Delfs, Hans Verfasser aut Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl 1st ed. 2002 Berlin, Heidelberg Springer Berlin Heidelberg 2002 1 Online-Ressource (XIV, 310 p) txt rdacontent c rdamedia cr rdacarrier Information Security and Cryptography Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks Cryptology Coding and Information Theory Data encryption (Computer science) Coding theory Information theory Kryptosystem (DE-588)4209132-9 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 s Kryptologie (DE-588)4033329-2 s DE-604 Public-Key-Kryptosystem (DE-588)4209133-0 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Knebl, Helmut aut Erscheint auch als Druck-Ausgabe 9783642871283 Erscheint auch als Druck-Ausgabe 9783540781141 Erscheint auch als Druck-Ausgabe 9783540422785 Erscheint auch als Druck-Ausgabe 9783642871276 https://doi.org/10.1007/978-3-642-87126-9 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Delfs, Hans Knebl, Helmut Introduction to Cryptography Principles and Applications Cryptology Coding and Information Theory Data encryption (Computer science) Coding theory Information theory Kryptosystem (DE-588)4209132-9 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4209133-0 (DE-588)4128252-8 (DE-588)4033329-2 (DE-588)4709127-7 |
title | Introduction to Cryptography Principles and Applications |
title_auth | Introduction to Cryptography Principles and Applications |
title_exact_search | Introduction to Cryptography Principles and Applications |
title_exact_search_txtP | Introduction to Cryptography Principles and Applications |
title_full | Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl |
title_fullStr | Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl |
title_full_unstemmed | Introduction to Cryptography Principles and Applications by Hans Delfs, Helmut Knebl |
title_short | Introduction to Cryptography |
title_sort | introduction to cryptography principles and applications |
title_sub | Principles and Applications |
topic | Cryptology Coding and Information Theory Data encryption (Computer science) Coding theory Information theory Kryptosystem (DE-588)4209132-9 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Cryptology Coding and Information Theory Data encryption (Computer science) Coding theory Information theory Kryptosystem Public-Key-Kryptosystem Kommunikationsprotokoll Kryptologie Sicherheitsprotokoll |
url | https://doi.org/10.1007/978-3-642-87126-9 |
work_keys_str_mv | AT delfshans introductiontocryptographyprinciplesandapplications AT kneblhelmut introductiontocryptographyprinciplesandapplications |