A Course in Mathematical Cryptography:
The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical metho...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin/Boston
De Gruyter
2015
|
Schriftenreihe: | De Gruyter Textbook
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value. Gilbert Baumslag?; Benjamin Fine, Fairfield Uni;Martin Kreuzer, Uni of Passau; Gerhard Rosenberger, Uni of Hamburg. |
Beschreibung: | Lizenzpflichtig |
Beschreibung: | Online-Ressource. |
ISBN: | 9783110386165 311038616X 9783110372779 3110372770 |
Internformat
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn927947377 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m d | ||
007 | cr ||||||||||| | ||
008 | 160526s2015 gw o 000 0 eng | ||
040 | |a GWDNB |b ger |c GWDNB |d DEBBG |d GWDNB |d DEGRU |d OCLCF |d DEBSZ |d OCLCO |d OCLCL | ||
015 | |a 16,O06 |2 dnb | ||
016 | 7 | |a 1101874937 |2 DE-101 | |
016 | 7 | |a 1114197807 |2 DE-101 | |
019 | |a 992926936 |a 1165469745 |a 1165564966 |a 1198843689 | ||
020 | |a 9783110386165 | ||
020 | |a 311038616X | ||
020 | |a 9783110372779 | ||
020 | |a 3110372770 | ||
024 | 3 | |a 9783110386165 | |
024 | 8 | |2 urn |a urn:nbn:de:101:1-2016052617490 | |
024 | 3 | |a 9783110372779 | |
024 | 7 | |a urn:nbn:de:101:1-201609205039 |2 urn | |
035 | |a (OCoLC)927947377 |z (OCoLC)992926936 |z (OCoLC)1165469745 |z (OCoLC)1165564966 |z (OCoLC)1198843689 | ||
044 | |c XA-DE-BE | ||
050 | 4 | |a QA268 |b .B38 2015 | |
082 | 4 | |8 1\p |a 510 |q DE-101 | |
084 | |a 510 |q DE-101 |2 sdnb | ||
049 | |a MAIN | ||
100 | 1 | |a Baumslag, Gilbert |e Verfasser |4 aut | |
245 | 1 | 0 | |a A Course in Mathematical Cryptography |c Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger |
264 | 1 | |a Berlin/Boston |b De Gruyter |c 2015 | |
300 | |a Online-Ressource. | ||
336 | |a Text |b txt |2 rdacontent/ger | ||
337 | |a Computermedien |b c |2 rdamedia/ger | ||
338 | |a Online-Ressource |b cr |2 rdacarrier/ger | ||
490 | 0 | |a De Gruyter Textbook | |
500 | |a Lizenzpflichtig | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |5 DE-101 |2 pdager | |
505 | 0 | 0 | |t Frontmatter -- |t Preface -- |t Contents -- |t 1. Basic Ideas of Cryptography -- |t 2. Symmetric Key Cryptosystems -- |t 3. Cryptanalysis and Complexity -- |t 4. Cryptographic Protocols -- |t 5. Elementary Number Theoretic Techniques -- |t 6. Some Number Theoretic Algorithms -- |t 7. Public Key Cryptography -- |t 8. Elliptic Curve Cryptography -- |t 9. Basic Concepts from Group Theory -- |t 10. Non-Commutative Group Based Cryptography -- |t 11. Platform Groups and Braid Group Cryptography -- |t 12. Further Applications Using Group Theory -- |t 13. Commutative Gröbner Basis Methods -- |t 14. Non-Commutative Gröbner Basis Methods -- |t 15. Lattice-Based Cryptography -- |t Bibliography -- |t Index. |
520 | 0 | |a The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value. Gilbert Baumslag?; Benjamin Fine, Fairfield Uni;Martin Kreuzer, Uni of Passau; Gerhard Rosenberger, Uni of Hamburg. | |
650 | 0 | |a Coding theory. |0 http://id.loc.gov/authorities/subjects/sh85027654 | |
650 | 0 | |a Cryptography |x Mathematics. | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Public key cryptography. |0 http://id.loc.gov/authorities/subjects/sh00004804 | |
650 | 4 | |a Kyptographie. | |
650 | 6 | |a Cryptographie |x Mathématiques. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Cryptographie à clé publique. | |
650 | 7 | |a Coding theory. |2 fast |0 (OCoLC)fst00866237 | |
650 | 7 | |a Cryptography |x Mathematics. |2 fast |0 (OCoLC)fst00884558 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
650 | 7 | |a Public key cryptography. |2 fast |0 (OCoLC)fst01082562 | |
653 | |a (Produktform)Electronic book text | ||
653 | |a (Zielgruppe)Fachhochschul-/Hochschulausbildung | ||
653 | |a (BISAC Subject Heading)COM014000 | ||
653 | |a (BISAC Subject Heading)MAT008000: MAT008000 MATHEMATICS / Discrete Mathematics | ||
653 | |a (BISAC Subject Heading)MAT036000: MAT036000 MATHEMATICS / Combinatorics | ||
653 | |a Kyptographie | ||
653 | |a EBK: eBook | ||
653 | |a (VLB-WN)9620 | ||
700 | 1 | |a Fine, Benjamin |d 1948- |e Verfasser |4 aut |1 https://id.oclc.org/worldcat/entity/E39PCjvPvPMdHKvtHcTy3FWyQy |0 http://d-nb.info/gnd/132345048 | |
700 | 1 | |a Kreuzer, Martin |e Verfasser |4 aut | |
700 | 1 | |a Rosenberger, Gerhard |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9783110372779 |
776 | 0 | 8 | |i Elektronische Reproduktion von |z 9783110372762 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016960 |3 Volltext |
883 | 0 | |8 1\p |a maschinell gebildet |c 0,997 |d 20160527 |q DE-101 | |
938 | |a De Gruyter |b DEGR |n 9783110372779 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn927947377 |
---|---|
_version_ | 1816882328953159680 |
adam_text | |
any_adam_object | |
author | Baumslag, Gilbert Fine, Benjamin 1948- Kreuzer, Martin Rosenberger, Gerhard |
author_GND | http://d-nb.info/gnd/132345048 |
author_facet | Baumslag, Gilbert Fine, Benjamin 1948- Kreuzer, Martin Rosenberger, Gerhard |
author_role | aut aut aut aut |
author_sort | Baumslag, Gilbert |
author_variant | g b gb b f bf m k mk g r gr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA268 |
callnumber-raw | QA268 .B38 2015 |
callnumber-search | QA268 .B38 2015 |
callnumber-sort | QA 3268 B38 42015 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index. |
ctrlnum | (OCoLC)927947377 |
dewey-full | 510 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 510 - Mathematics |
dewey-raw | 510 |
dewey-search | 510 |
dewey-sort | 3510 |
dewey-tens | 510 - Mathematics |
discipline | Mathematik |
format | eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04488cam a2200817 c 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn927947377</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">160526s2015 gw o 000 0 eng </controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">GWDNB</subfield><subfield code="b">ger</subfield><subfield code="c">GWDNB</subfield><subfield code="d">DEBBG</subfield><subfield code="d">GWDNB</subfield><subfield code="d">DEGRU</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">16,O06</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1101874937</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1114197807</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">992926936</subfield><subfield code="a">1165469745</subfield><subfield code="a">1165564966</subfield><subfield code="a">1198843689</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110386165</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">311038616X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110372779</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110372770</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783110386165</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="2">urn</subfield><subfield code="a">urn:nbn:de:101:1-2016052617490</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783110372779</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">urn:nbn:de:101:1-201609205039</subfield><subfield code="2">urn</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)927947377</subfield><subfield code="z">(OCoLC)992926936</subfield><subfield code="z">(OCoLC)1165469745</subfield><subfield code="z">(OCoLC)1165564966</subfield><subfield code="z">(OCoLC)1198843689</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA268</subfield><subfield code="b">.B38 2015</subfield></datafield><datafield tag="082" ind1=" " ind2="4"><subfield code="8">1\p</subfield><subfield code="a">510</subfield><subfield code="q">DE-101</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">510</subfield><subfield code="q">DE-101</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Baumslag, Gilbert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A Course in Mathematical Cryptography</subfield><subfield code="c">Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin/Boston</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online-Ressource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent/ger</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia/ger</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier/ger</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Textbook</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Lizenzpflichtig</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung/Langzeitarchivierung gewährleistet</subfield><subfield code="5">DE-101</subfield><subfield code="2">pdager</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter --</subfield><subfield code="t">Preface --</subfield><subfield code="t">Contents --</subfield><subfield code="t">1. Basic Ideas of Cryptography --</subfield><subfield code="t">2. Symmetric Key Cryptosystems --</subfield><subfield code="t">3. Cryptanalysis and Complexity --</subfield><subfield code="t">4. Cryptographic Protocols --</subfield><subfield code="t">5. Elementary Number Theoretic Techniques --</subfield><subfield code="t">6. Some Number Theoretic Algorithms --</subfield><subfield code="t">7. Public Key Cryptography --</subfield><subfield code="t">8. Elliptic Curve Cryptography --</subfield><subfield code="t">9. Basic Concepts from Group Theory --</subfield><subfield code="t">10. Non-Commutative Group Based Cryptography --</subfield><subfield code="t">11. Platform Groups and Braid Group Cryptography --</subfield><subfield code="t">12. Further Applications Using Group Theory --</subfield><subfield code="t">13. Commutative Gröbner Basis Methods --</subfield><subfield code="t">14. Non-Commutative Gröbner Basis Methods --</subfield><subfield code="t">15. Lattice-Based Cryptography --</subfield><subfield code="t">Bibliography --</subfield><subfield code="t">Index.</subfield></datafield><datafield tag="520" ind1="0" ind2=" "><subfield code="a">The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value. Gilbert Baumslag?; Benjamin Fine, Fairfield Uni;Martin Kreuzer, Uni of Passau; Gerhard Rosenberger, Uni of Hamburg.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85027654</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">Mathematics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key cryptography.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00004804</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kyptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie</subfield><subfield code="x">Mathématiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie à clé publique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coding theory.</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst00866237</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="x">Mathematics.</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst00884558</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst00887935</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key cryptography.</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst01082562</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">(Produktform)Electronic book text</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">(Zielgruppe)Fachhochschul-/Hochschulausbildung</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">(BISAC Subject Heading)COM014000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">(BISAC Subject Heading)MAT008000: MAT008000 MATHEMATICS / Discrete Mathematics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">(BISAC Subject Heading)MAT036000: MAT036000 MATHEMATICS / Combinatorics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Kyptographie</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">EBK: eBook</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">(VLB-WN)9620</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fine, Benjamin</subfield><subfield code="d">1948-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvPvPMdHKvtHcTy3FWyQy</subfield><subfield code="0">http://d-nb.info/gnd/132345048</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kreuzer, Martin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rosenberger, Gerhard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9783110372779</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Elektronische Reproduktion von</subfield><subfield code="z">9783110372762</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016960</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">maschinell gebildet</subfield><subfield code="c">0,997</subfield><subfield code="d">20160527</subfield><subfield code="q">DE-101</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9783110372779</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn927947377 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:26:52Z |
institution | BVB |
isbn | 9783110386165 311038616X 9783110372779 3110372770 |
language | English |
oclc_num | 927947377 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | Online-Ressource. |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | De Gruyter |
record_format | marc |
series2 | De Gruyter Textbook |
spelling | Baumslag, Gilbert Verfasser aut A Course in Mathematical Cryptography Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger Berlin/Boston De Gruyter 2015 Online-Ressource. Text txt rdacontent/ger Computermedien c rdamedia/ger Online-Ressource cr rdacarrier/ger De Gruyter Textbook Lizenzpflichtig Archivierung/Langzeitarchivierung gewährleistet DE-101 pdager Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index. The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value. Gilbert Baumslag?; Benjamin Fine, Fairfield Uni;Martin Kreuzer, Uni of Passau; Gerhard Rosenberger, Uni of Hamburg. Coding theory. http://id.loc.gov/authorities/subjects/sh85027654 Cryptography Mathematics. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Public key cryptography. http://id.loc.gov/authorities/subjects/sh00004804 Kyptographie. Cryptographie Mathématiques. Chiffrement (Informatique) Cryptographie à clé publique. Coding theory. fast (OCoLC)fst00866237 Cryptography Mathematics. fast (OCoLC)fst00884558 Data encryption (Computer science) fast (OCoLC)fst00887935 Public key cryptography. fast (OCoLC)fst01082562 (Produktform)Electronic book text (Zielgruppe)Fachhochschul-/Hochschulausbildung (BISAC Subject Heading)COM014000 (BISAC Subject Heading)MAT008000: MAT008000 MATHEMATICS / Discrete Mathematics (BISAC Subject Heading)MAT036000: MAT036000 MATHEMATICS / Combinatorics Kyptographie EBK: eBook (VLB-WN)9620 Fine, Benjamin 1948- Verfasser aut https://id.oclc.org/worldcat/entity/E39PCjvPvPMdHKvtHcTy3FWyQy http://d-nb.info/gnd/132345048 Kreuzer, Martin Verfasser aut Rosenberger, Gerhard Verfasser aut Erscheint auch als Online-Ausgabe 9783110372779 Elektronische Reproduktion von 9783110372762 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016960 Volltext 1\p maschinell gebildet 0,997 20160527 DE-101 |
spellingShingle | Baumslag, Gilbert Fine, Benjamin 1948- Kreuzer, Martin Rosenberger, Gerhard A Course in Mathematical Cryptography Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index. Coding theory. http://id.loc.gov/authorities/subjects/sh85027654 Cryptography Mathematics. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Public key cryptography. http://id.loc.gov/authorities/subjects/sh00004804 Kyptographie. Cryptographie Mathématiques. Chiffrement (Informatique) Cryptographie à clé publique. Coding theory. fast (OCoLC)fst00866237 Cryptography Mathematics. fast (OCoLC)fst00884558 Data encryption (Computer science) fast (OCoLC)fst00887935 Public key cryptography. fast (OCoLC)fst01082562 |
subject_GND | http://id.loc.gov/authorities/subjects/sh85027654 http://id.loc.gov/authorities/subjects/sh94001524 http://id.loc.gov/authorities/subjects/sh00004804 (OCoLC)fst00866237 (OCoLC)fst00884558 (OCoLC)fst00887935 (OCoLC)fst01082562 |
title | A Course in Mathematical Cryptography |
title_alt | Frontmatter -- Preface -- Contents -- 1. Basic Ideas of Cryptography -- 2. Symmetric Key Cryptosystems -- 3. Cryptanalysis and Complexity -- 4. Cryptographic Protocols -- 5. Elementary Number Theoretic Techniques -- 6. Some Number Theoretic Algorithms -- 7. Public Key Cryptography -- 8. Elliptic Curve Cryptography -- 9. Basic Concepts from Group Theory -- 10. Non-Commutative Group Based Cryptography -- 11. Platform Groups and Braid Group Cryptography -- 12. Further Applications Using Group Theory -- 13. Commutative Gröbner Basis Methods -- 14. Non-Commutative Gröbner Basis Methods -- 15. Lattice-Based Cryptography -- Bibliography -- Index. |
title_auth | A Course in Mathematical Cryptography |
title_exact_search | A Course in Mathematical Cryptography |
title_full | A Course in Mathematical Cryptography Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger |
title_fullStr | A Course in Mathematical Cryptography Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger |
title_full_unstemmed | A Course in Mathematical Cryptography Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger |
title_short | A Course in Mathematical Cryptography |
title_sort | a course in mathematical cryptography |
topic | Coding theory. http://id.loc.gov/authorities/subjects/sh85027654 Cryptography Mathematics. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Public key cryptography. http://id.loc.gov/authorities/subjects/sh00004804 Kyptographie. Cryptographie Mathématiques. Chiffrement (Informatique) Cryptographie à clé publique. Coding theory. fast (OCoLC)fst00866237 Cryptography Mathematics. fast (OCoLC)fst00884558 Data encryption (Computer science) fast (OCoLC)fst00887935 Public key cryptography. fast (OCoLC)fst01082562 |
topic_facet | Coding theory. Cryptography Mathematics. Data encryption (Computer science) Public key cryptography. Kyptographie. Cryptographie Mathématiques. Chiffrement (Informatique) Cryptographie à clé publique. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016960 |
work_keys_str_mv | AT baumslaggilbert acourseinmathematicalcryptography AT finebenjamin acourseinmathematicalcryptography AT kreuzermartin acourseinmathematicalcryptography AT rosenbergergerhard acourseinmathematicalcryptography |