Cryptography arithmetic: algorithms and hardware architectures
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2020]
|
Schriftenreihe: | Advances in information security
Volume 77 |
Schlagworte: | |
Beschreibung: | xiv, 336 Seiten Diagramme |
ISBN: | 9783030341411 |
ISSN: | 1568-2633 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV049499245 | ||
003 | DE-604 | ||
005 | 20240322 | ||
007 | t | ||
008 | 240115s2020 |||| |||| 00||| eng d | ||
020 | |a 9783030341411 |c hbk |9 978-3-030-34141-1 | ||
035 | |a (OCoLC)1141776864 | ||
035 | |a (DE-599)BVBBV049499245 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.73 |2 23 | |
084 | |a 11T71 |2 msc/2020 | ||
084 | |a 94A60 |2 msc/2020 | ||
084 | |a 68M07 |2 msc/2020 | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Omondi, Amos R. |d ca. 20./21. Jahrhundert |0 (DE-588)1206345403 |4 aut | |
245 | 1 | 0 | |a Cryptography arithmetic |b algorithms and hardware architectures |c Amos R. Omondi |
264 | 1 | |a Cham |b Springer |c [2020] | |
264 | 4 | |c © 2020 | |
300 | |a xiv, 336 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v Volume 77 |x 1568-2633 | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Processor Architectures | |
650 | 4 | |a Circuits and Systems | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Microprocessors | |
650 | 4 | |a Electronic circuits | |
650 | 0 | 7 | |a Mikroprozessor |0 (DE-588)4039232-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenstruktur |0 (DE-588)4011146-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstheorie |0 (DE-588)4026927-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenstruktur |0 (DE-588)4011146-5 |D s |
689 | 0 | 1 | |a Informationstheorie |0 (DE-588)4026927-9 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Mikroprozessor |0 (DE-588)4039232-6 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-34142-8 |
830 | 0 | |a Advances in information security |v Volume 77 |w (DE-604)BV022281064 |9 77 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034844413 |
Datensatz im Suchindex
_version_ | 1804186304512000000 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Omondi, Amos R. ca. 20./21. Jahrhundert |
author_GND | (DE-588)1206345403 |
author_facet | Omondi, Amos R. ca. 20./21. Jahrhundert |
author_role | aut |
author_sort | Omondi, Amos R. ca. 20./21. Jahrhundert |
author_variant | a r o ar aro |
building | Verbundindex |
bvnumber | BV049499245 |
classification_tum | DAT 000 |
ctrlnum | (OCoLC)1141776864 (DE-599)BVBBV049499245 |
dewey-full | 005.73 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.73 |
dewey-search | 005.73 |
dewey-sort | 15.73 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01999nam a2200565 cb4500</leader><controlfield tag="001">BV049499245</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240322 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240115s2020 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030341411</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-030-34141-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1141776864</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049499245</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.73</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">11T71</subfield><subfield code="2">msc/2020</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc/2020</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68M07</subfield><subfield code="2">msc/2020</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Omondi, Amos R.</subfield><subfield code="d">ca. 20./21. Jahrhundert</subfield><subfield code="0">(DE-588)1206345403</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography arithmetic</subfield><subfield code="b">algorithms and hardware architectures</subfield><subfield code="c">Amos R. Omondi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 336 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">Volume 77</subfield><subfield code="x">1568-2633</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Processor Architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Circuits and Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microprocessors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic circuits</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mikroprozessor</subfield><subfield code="0">(DE-588)4039232-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Mikroprozessor</subfield><subfield code="0">(DE-588)4039232-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-34142-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">Volume 77</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">77</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034844413</subfield></datafield></record></collection> |
id | DE-604.BV049499245 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:21:01Z |
indexdate | 2024-07-10T10:09:00Z |
institution | BVB |
isbn | 9783030341411 |
issn | 1568-2633 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034844413 |
oclc_num | 1141776864 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | xiv, 336 Seiten Diagramme |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Omondi, Amos R. ca. 20./21. Jahrhundert (DE-588)1206345403 aut Cryptography arithmetic algorithms and hardware architectures Amos R. Omondi Cham Springer [2020] © 2020 xiv, 336 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Advances in information security Volume 77 1568-2633 Data Structures and Information Theory Cryptology Processor Architectures Circuits and Systems Data structures (Computer science) Data encryption (Computer science) Microprocessors Electronic circuits Mikroprozessor (DE-588)4039232-6 gnd rswk-swf Datenstruktur (DE-588)4011146-5 gnd rswk-swf Informationstheorie (DE-588)4026927-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Datenstruktur (DE-588)4011146-5 s Informationstheorie (DE-588)4026927-9 s Kryptologie (DE-588)4033329-2 s Mikroprozessor (DE-588)4039232-6 s DE-604 Erscheint auch als Online-Ausgabe 978-3-030-34142-8 Advances in information security Volume 77 (DE-604)BV022281064 77 |
spellingShingle | Omondi, Amos R. ca. 20./21. Jahrhundert Cryptography arithmetic algorithms and hardware architectures Advances in information security Data Structures and Information Theory Cryptology Processor Architectures Circuits and Systems Data structures (Computer science) Data encryption (Computer science) Microprocessors Electronic circuits Mikroprozessor (DE-588)4039232-6 gnd Datenstruktur (DE-588)4011146-5 gnd Informationstheorie (DE-588)4026927-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4039232-6 (DE-588)4011146-5 (DE-588)4026927-9 (DE-588)4033329-2 |
title | Cryptography arithmetic algorithms and hardware architectures |
title_auth | Cryptography arithmetic algorithms and hardware architectures |
title_exact_search | Cryptography arithmetic algorithms and hardware architectures |
title_exact_search_txtP | Cryptography arithmetic algorithms and hardware architectures |
title_full | Cryptography arithmetic algorithms and hardware architectures Amos R. Omondi |
title_fullStr | Cryptography arithmetic algorithms and hardware architectures Amos R. Omondi |
title_full_unstemmed | Cryptography arithmetic algorithms and hardware architectures Amos R. Omondi |
title_short | Cryptography arithmetic |
title_sort | cryptography arithmetic algorithms and hardware architectures |
title_sub | algorithms and hardware architectures |
topic | Data Structures and Information Theory Cryptology Processor Architectures Circuits and Systems Data structures (Computer science) Data encryption (Computer science) Microprocessors Electronic circuits Mikroprozessor (DE-588)4039232-6 gnd Datenstruktur (DE-588)4011146-5 gnd Informationstheorie (DE-588)4026927-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Data Structures and Information Theory Cryptology Processor Architectures Circuits and Systems Data structures (Computer science) Data encryption (Computer science) Microprocessors Electronic circuits Mikroprozessor Datenstruktur Informationstheorie Kryptologie |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT omondiamosr cryptographyarithmeticalgorithmsandhardwarearchitectures |