Introduction to Cryptography - Livres de poche
2012, ISBN: 1468404989
[EAN: 9781468404982], Neubuch, [PU: Springer New York Jan 2012], TECHNOLOGY; UNIVERSITY; VI; EUCLIDEANALGORITHM; MICROSOFTACCESS; ALGEBRA; ARITHMETIC; CALCULUS; CONTROL; ELLIPTICCURVE; FI… Plus…
AbeBooks.de BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)] NEW BOOK. Frais d'envoiVersandkostenfrei. (EUR 0.00) Details... |
Introduction to Cryptography - Livres de poche
2012, ISBN: 1468404989
[EAN: 9781468404982], Neubuch, [SC: 0.0], [PU: Springer New York], TECHNOLOGY; UNIVERSITY; VI; EUCLIDEANALGORITHM; MICROSOFTACCESS; ALGEBRA; ARITHMETIC; CALCULUS; CONTROL; ELLIPTICCURVE; … Plus…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Frais d'envoiVersandkostenfrei. (EUR 0.00) Details... |
ISBN: 9781468404982
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its te… Plus…
BarnesandNoble.com new in stock. Frais d'envoizzgl. Versandkosten., Livraison non-comprise Details... |
ISBN: 9781468404982
Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement elect… Plus…
BarnesandNoble.com new in stock. Frais d'envoizzgl. Versandkosten., Livraison non-comprise Details... |
ISBN: 9781468404982
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its te… Plus…
Springer.com Nr. 978-1-4684-0498-2. Frais d'envoiWorldwide free shipping, , DE. (EUR 0.00) Details... |
Introduction to Cryptography - Livres de poche
2012, ISBN: 1468404989
[EAN: 9781468404982], Neubuch, [PU: Springer New York Jan 2012], TECHNOLOGY; UNIVERSITY; VI; EUCLIDEANALGORITHM; MICROSOFTACCESS; ALGEBRA; ARITHMETIC; CALCULUS; CONTROL; ELLIPTICCURVE; FI… Plus…
Johannes Buchmann:
Introduction to Cryptography - Livres de poche2012, ISBN: 1468404989
[EAN: 9781468404982], Neubuch, [SC: 0.0], [PU: Springer New York], TECHNOLOGY; UNIVERSITY; VI; EUCLIDEANALGORITHM; MICROSOFTACCESS; ALGEBRA; ARITHMETIC; CALCULUS; CONTROL; ELLIPTICCURVE; … Plus…
ISBN: 9781468404982
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its te… Plus…
ISBN: 9781468404982
Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement elect… Plus…
ISBN: 9781468404982
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its te… Plus…
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Introduction to Cryptography Johannes Buchmann Author
EAN (ISBN-13): 9781468404982
ISBN (ISBN-10): 1468404989
Version reliée
Livre de poche
Date de parution: 2012
Editeur: Springer New York Core >1 >T
300 Pages
Poids: 0,449 kg
Langue: Englisch
Livre dans la base de données depuis 2008-07-01T13:25:31+02:00 (Paris)
Page de détail modifiée en dernier sur 2024-04-12T18:30:55+02:00 (Paris)
ISBN/EAN: 1468404989
ISBN - Autres types d'écriture:
1-4684-0498-9, 978-1-4684-0498-2
Autres types d'écriture et termes associés:
Auteur du livre: buchmann, büchmann, humboldt alexander von, alexander block, manuel peters
Titre du livre: introduction cryptography, buchmann
Données de l'éditeur
Auteur: Johannes Buchmann
Titre: Undergraduate Texts in Mathematics; Introduction to Cryptography
Editeur: Springer; Springer US
281 Pages
Date de parution: 2012-01-21
New York; NY; US
Imprimé / Fabriqué en
Langue: Anglais
54,99 € (DE)
BC; Hardcover, Softcover / Mathematik/Arithmetik, Algebra; Zahlentheorie; Verstehen; Euclidean algorithm; Microsoft Access; algebra; arithmetic; calculus; control; cryptography; elliptic curve; finite field; number theory; prime number; probability; technology; university; vi; Number Theory; Data Structures and Information Theory; Algorithmen und Datenstrukturen; Informationstheorie; BB
1 Integers.- 1.1 Basics.- 1.2 Divisibility.- 1.3 Representation of Integers.- 1.4 O- and ?-Notation.- 1.5 Cost of Addition, Multiplication, and Division with Remainder.- 1.6 Polynomial Time.- 1.7 Greatest Common Divisor.- 1.8 Euclidean Algorithm.- 1.9 Extended Euclidean Algorithm.- 1.10 Analysis of the Extended Euclidean Algorithm.- 1.11 Factoring into Primes.- 1.12 Exercises.- 2 Congruences and Residue Class Rings.- 2.1 Congruences.- 2.2 Semigroups.- 2.3 Groups.- 2.4 Residue Class Rings.- 2.5 Fields.- 2.6 Division in the Residue Class Ring.- 2.7 Analysis of Operations in the Residue Class Ring.- 2.8 Multiplicative Group of Residues.- 2.9 Order of Group Elements.- 2.10 Subgroups.- 2.11 Fermat’s Little Theorem.- 2.12 Fast Exponentiation.- 2.13 Fast Evaluation of Power Products.- 2.14 Computation of Element Orders.- 2.15 The Chinese Remainder Theorem.- 2.16 Decomposition of the Residue Class Ring.- 2.17 A Formula for the Euler ?-Function.- 2.18 Polynomials.- 2.19 Polynomials over Fields.- 2.20 Structure of the Unit Group of Finite Fields.- 2.21 Structure of the Multiplicative Group of Residues mod a Prime Number.- 2.22 Exercises.- 3 Encryption.- 3.1 Encryption Schemes.- 3.2 Symmetric and Asymmetric Cryptosystems.- 3.3 Cryptanalysis.- 3.4 Alphabets and Words.- 3.5 Permutations.- 3.6 Block Ciphers.- 3.7 Multiple Encryption.- 3.8 Use of Block Ciphers.- 3.9 Stream Ciphers.- 3.10 Affine Cipher.- 3.11 Matrices and Linear Maps.- 3.12 Affine Linear Block Ciphers.- 3.13 Vigenère, Hill, and Permutation Ciphers.- 3.14 Cryptanalysis of Affine Linear Block Ciphers.- 3.15 Exercises.- 4 Probability and Perfect Secrecy.- 4.1 Probability.- 4.2 Conditional Probability.- 4.3 Birthday Paradox.- 4.4 Perfect Secrecy.- 4.5 Vernam One-Time Pad.- 4.6 Random Numbers.- 4.7 PseudorandomNumbers.- 4.8 Exercises.- 5 DES.- 5.1 Feistel Ciphers.- 5.2 DES Algorithm.- 5.3 An Example.- 5.4 Security of DES.- 5.5 Exercises.- 6 Prime Number Generation.- 6.1 Trial Division.- 6.2 Fermat Test.- 6.3 Carmichael Numbers.- 6.4 Miller-Rabin Test.- 6.5 Random Primes.- 6.6 Exercises.- 7 Public-Key Encryption.- 7.1 Idea.- 7.2 RSA Cryptosystem.- 7.3 Rabin Encryption.- 7.4 Diffie-Hellman Key Exchange.- 7.5 ElGamal Encryption.- 7.6 Exercises.- 8 Factoring.- 8.1 Trial Division.- 8.2 p — 1 Method.- 8.3 Quadratic Sieve.- 8.4 Analysis of the Quadratic Sieve.- 8.5 Efficiency of Other Factoring Algorithms.- 8.6 Exercises.- 9 Discrete Logarithms.- 9.1 DL Problem.- 9.2 Enumeration.- 9.3 Shanks Baby-Step Giant-Step Algorithm.- 9.4 Pollard ?-Algorithm.- 9.5 Pohlig-Hellman Algorithm.- 9.6 Index Calculus.- 9.7 Other Algorithms.- 9.8 Generalization of the Index Calculus Algorithm.- 9.9 Exercises.- 10 Cryptographic Hash Functions.- 10.1 Hash Functions and Compression Functions.- 10.2 Birthday Attack.- 10.3 Compression Functions from Encryption Functions.- 10.4 Hash Functions from Compression Functions.- 10.5 Efficient Hash Functions.- 10.6 An Arithmetic Compression Function.- 10.7 Message Authentication Codes.- 10.8 Exercises.- 11 Digital Signatures.- 11.1 Idea.- 11.2 RSA Signatures.- 11.3 Signatures from Public-Key Systems.- 11.4 ElGamal Signature.- 11.5 Digital Signature Algorithm (DSA).- 11.6 Exercises.- 12 Other Groups.- 12.1 Finite Fields.- 12.2 Elliptic Curves.- 12.3 Quadratic Forms.- 12.4 Exercises.- 13 Identification.- 13.1 Passwords.- 13.2 One-Time Passwords.- 13.3 Challenge-Response Identification.- 13.4 Exercises.- 14 Public-Key Infrastructures.- 14.1 Personal Security Environments.- 14.2 Certification Authorities.- 14.3 Certificate Chains.- References.- Solutions to theExercises.Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
2900387207567 Introduction to Cryptography (Johannes Buchmann)
< pour archiver...