Energy-efficient modular exponential techniques for public-key cryptography: efficient modular exponential techniques
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2021]
|
Schlagworte: | |
Beschreibung: | xx, 257 Seiten Illustrationen |
ISBN: | 9783030745233 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047605859 | ||
003 | DE-604 | ||
005 | 20221025 | ||
007 | t | ||
008 | 211122s2021 a||| |||| 00||| eng d | ||
020 | |a 9783030745233 |9 978-3-030-74523-3 | ||
035 | |a (OCoLC)1349544794 | ||
035 | |a (DE-599)BVBBV047605859 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Vollala, Satyanarayana |e Verfasser |4 aut | |
245 | 1 | 0 | |a Energy-efficient modular exponential techniques for public-key cryptography |b efficient modular exponential techniques |c Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari |
264 | 1 | |a Cham |b Springer |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a xx, 257 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Computer Hardware | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Programming Techniques | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer hardware | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer programming | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ramasubramanian, N. |4 aut | |
700 | 1 | |a Tiwari, Utkarsh |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-74524-0 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032990866 |
Datensatz im Suchindex
_version_ | 1804182969672269824 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Vollala, Satyanarayana Ramasubramanian, N. Tiwari, Utkarsh |
author_facet | Vollala, Satyanarayana Ramasubramanian, N. Tiwari, Utkarsh |
author_role | aut aut aut |
author_sort | Vollala, Satyanarayana |
author_variant | s v sv n r nr u t ut |
building | Verbundindex |
bvnumber | BV047605859 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1349544794 (DE-599)BVBBV047605859 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01740nam a2200505 c 4500</leader><controlfield tag="001">BV047605859</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221025 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211122s2021 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030745233</subfield><subfield code="9">978-3-030-74523-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1349544794</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047605859</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vollala, Satyanarayana</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Energy-efficient modular exponential techniques for public-key cryptography</subfield><subfield code="b">efficient modular exponential techniques</subfield><subfield code="c">Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 257 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Hardware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hardware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramasubramanian, N.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tiwari, Utkarsh</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-74524-0</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032990866</subfield></datafield></record></collection> |
id | DE-604.BV047605859 |
illustrated | Illustrated |
index_date | 2024-07-03T18:38:12Z |
indexdate | 2024-07-10T09:16:00Z |
institution | BVB |
isbn | 9783030745233 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032990866 |
oclc_num | 1349544794 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xx, 257 Seiten Illustrationen |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer |
record_format | marc |
spelling | Vollala, Satyanarayana Verfasser aut Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari Cham Springer [2021] © 2021 xx, 257 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Systems and Data Security Cryptology Computer Hardware Data Structures and Information Theory Programming Techniques Computer security Data encryption (Computer science) Computer hardware Data structures (Computer science) Computer programming Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 s Kryptologie (DE-588)4033329-2 s DE-604 Ramasubramanian, N. aut Tiwari, Utkarsh aut Erscheint auch als Online-Ausgabe 978-3-030-74524-0 |
spellingShingle | Vollala, Satyanarayana Ramasubramanian, N. Tiwari, Utkarsh Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques Systems and Data Security Cryptology Computer Hardware Data Structures and Information Theory Programming Techniques Computer security Data encryption (Computer science) Computer hardware Data structures (Computer science) Computer programming Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4011144-1 |
title | Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques |
title_auth | Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques |
title_exact_search | Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques |
title_exact_search_txtP | Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques |
title_full | Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari |
title_fullStr | Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari |
title_full_unstemmed | Energy-efficient modular exponential techniques for public-key cryptography efficient modular exponential techniques Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari |
title_short | Energy-efficient modular exponential techniques for public-key cryptography |
title_sort | energy efficient modular exponential techniques for public key cryptography efficient modular exponential techniques |
title_sub | efficient modular exponential techniques |
topic | Systems and Data Security Cryptology Computer Hardware Data Structures and Information Theory Programming Techniques Computer security Data encryption (Computer science) Computer hardware Data structures (Computer science) Computer programming Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Systems and Data Security Cryptology Computer Hardware Data Structures and Information Theory Programming Techniques Computer security Data encryption (Computer science) Computer hardware Data structures (Computer science) Computer programming Kryptologie Datensicherung |
work_keys_str_mv | AT vollalasatyanarayana energyefficientmodularexponentialtechniquesforpublickeycryptographyefficientmodularexponentialtechniques AT ramasubramaniann energyefficientmodularexponentialtechniquesforpublickeycryptographyefficientmodularexponentialtechniques AT tiwariutkarsh energyefficientmodularexponentialtechniquesforpublickeycryptographyefficientmodularexponentialtechniques |