Public-Key Cryptography [electronic resource] /
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992.
Main Authors: | , |
---|---|
Format: | Texto biblioteca |
Language: | eng |
Published: |
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,
1996
|
Subjects: | Computer science., Computer communication systems., Data encryption (Computer science)., Coding theory., Computer science, Artificial intelligence., Complexity, Computational., Computer Science., Artificial Intelligence (incl. Robotics)., Data Encryption., Coding and Information Theory., Computer Communication Networks., Math Applications in Computer Science., Complexity., |
Online Access: | http://dx.doi.org/10.1007/978-3-662-03269-5 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
KOHA-OAI-TEST:189244 |
---|---|
record_format |
koha |
spelling |
KOHA-OAI-TEST:1892442018-07-30T23:12:56ZPublic-Key Cryptography [electronic resource] / Salomaa, Arto. author. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,1996.engCryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992.1. Classical Two-Way Cryptography -- 2. The Idea of Public Keys -- 3. Knapsack Systems -- 4. RSA -- 5. Other Bases of Cryptosystems -- 6. Cryptographic Protocols: Surprising Vistas for Communication -- Appendix A. Tutorial in Complexity Theory -- Appendix B. Tutorial in Number Theory -- Problems -- Historical and Bibliographical Remarks -- References.Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992.Computer science.Computer communication systems.Data encryption (Computer science).Coding theory.Computer scienceArtificial intelligence.Complexity, Computational.Computer Science.Artificial Intelligence (incl. Robotics).Data Encryption.Coding and Information Theory.Computer Communication Networks.Math Applications in Computer Science.Complexity.Springer eBookshttp://dx.doi.org/10.1007/978-3-662-03269-5URN:ISBN:9783662032695 |
institution |
COLPOS |
collection |
Koha |
country |
México |
countrycode |
MX |
component |
Bibliográfico |
access |
En linea En linea |
databasecode |
cat-colpos |
tag |
biblioteca |
region |
America del Norte |
libraryname |
Departamento de documentación y biblioteca de COLPOS |
language |
eng |
topic |
Computer science. Computer communication systems. Data encryption (Computer science). Coding theory. Computer science Artificial intelligence. Complexity, Computational. Computer Science. Artificial Intelligence (incl. Robotics). Data Encryption. Coding and Information Theory. Computer Communication Networks. Math Applications in Computer Science. Complexity. Computer science. Computer communication systems. Data encryption (Computer science). Coding theory. Computer science Artificial intelligence. Complexity, Computational. Computer Science. Artificial Intelligence (incl. Robotics). Data Encryption. Coding and Information Theory. Computer Communication Networks. Math Applications in Computer Science. Complexity. |
spellingShingle |
Computer science. Computer communication systems. Data encryption (Computer science). Coding theory. Computer science Artificial intelligence. Complexity, Computational. Computer Science. Artificial Intelligence (incl. Robotics). Data Encryption. Coding and Information Theory. Computer Communication Networks. Math Applications in Computer Science. Complexity. Computer science. Computer communication systems. Data encryption (Computer science). Coding theory. Computer science Artificial intelligence. Complexity, Computational. Computer Science. Artificial Intelligence (incl. Robotics). Data Encryption. Coding and Information Theory. Computer Communication Networks. Math Applications in Computer Science. Complexity. Salomaa, Arto. author. SpringerLink (Online service) Public-Key Cryptography [electronic resource] / |
description |
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992. |
format |
Texto |
topic_facet |
Computer science. Computer communication systems. Data encryption (Computer science). Coding theory. Computer science Artificial intelligence. Complexity, Computational. Computer Science. Artificial Intelligence (incl. Robotics). Data Encryption. Coding and Information Theory. Computer Communication Networks. Math Applications in Computer Science. Complexity. |
author |
Salomaa, Arto. author. SpringerLink (Online service) |
author_facet |
Salomaa, Arto. author. SpringerLink (Online service) |
author_sort |
Salomaa, Arto. author. |
title |
Public-Key Cryptography [electronic resource] / |
title_short |
Public-Key Cryptography [electronic resource] / |
title_full |
Public-Key Cryptography [electronic resource] / |
title_fullStr |
Public-Key Cryptography [electronic resource] / |
title_full_unstemmed |
Public-Key Cryptography [electronic resource] / |
title_sort |
public-key cryptography [electronic resource] / |
publisher |
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, |
publishDate |
1996 |
url |
http://dx.doi.org/10.1007/978-3-662-03269-5 |
work_keys_str_mv |
AT salomaaartoauthor publickeycryptographyelectronicresource AT springerlinkonlineservice publickeycryptographyelectronicresource |
_version_ |
1756265894075432960 |