|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3205978 |
003 |
MWH |
005 |
20191025182456.0 |
007 |
cr nn 008mamaa |
008 |
130220s1990 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662026274
|
024 |
7 |
|
|a 10.1007/978-3-662-02627-4
|2 doi
|
035 |
|
|
|a (DE-He213)978-3-662-02627-4
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
100 |
1 |
|
|a Salomaa, Arto.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Public-Key Cryptography
|h [electronic resource] /
|c by Arto Salomaa.
|
250 |
|
|
|a 1st ed. 1990.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 1990.
|
300 |
|
|
|a X, 247 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Monographs in Theoretical Computer Science. An EATCS Series,
|x 1431-2654 ;
|v 23
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a 1. Classical Two-Way Cryptography -- 2. The Idea of Public Keys -- 3. Knapsack Systems -- 4. RSA -- 5. Other Bases of Cryptosystems -- 6. Cryptographic Protocols: Surprising Vistas for Communication -- Appendix A. Tutorial in Complexity Theory -- Appendix B. Tutorial in Number Theory -- Problems -- Historical and Bibliographical Remarks -- References.
|
520 |
|
|
|a Cryptography, secret writing, is probably as old as writing itself. But only recently has it become the object of extensive scientific studies. Vast new applications to data security are one explanation for this. Perhaps a more important reason for the huge growth of scientific research on cryptography is the seminal idea of public-key cryptography and the resulting new vistas on the possibilities of communication. This book gives a broad overview of public-key cryptography, covering its essence and advantages, various public-key cryptosystems and protocols. It also gives a comprehensive introduction to classical cryptography and cryptanalysis. The book is self-contained and suitable both as a text and as a reference. It starts from the beginning but also includes some 1989 developments. The presentation is in many ways new, with some new results. The treatment is rigorous but avoids unnecessary formalism. The plaintext examples in the book form a package of basic sauna knowledge.
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Combinatorics.
|
690 |
|
|
|a Electronic resources (E-books)
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a Monographs in Theoretical Computer Science. An EATCS Series,
|x 1431-2654 ;
|v 23
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-662-02627-4
|3 Click to view e-book
|t 0
|
907 |
|
|
|a .b32059784
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g gw
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i21191438
|z 02-26-20
|
999 |
f |
f |
|i 1a6829ce-afcf-5f71-a08c-eab0bf9abe32
|s b6b7b8f5-6f19-5e37-bb32-5441afcc597d
|t 0
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|t 0
|e E-Book
|h Library of Congress classification
|i Elec File
|