Public-Key Cryptography [electronic resource] /

Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992.

Saved in:
Bibliographic Details
Main Authors: Salomaa, Arto. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1996
Subjects:Computer science., Computer communication systems., Data encryption (Computer science)., Coding theory., Computer science, Artificial intelligence., Complexity, Computational., Computer Science., Artificial Intelligence (incl. Robotics)., Data Encryption., Coding and Information Theory., Computer Communication Networks., Math Applications in Computer Science., Complexity.,
Online Access:http://dx.doi.org/10.1007/978-3-662-03269-5
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:189244
record_format koha
spelling KOHA-OAI-TEST:1892442018-07-30T23:12:56ZPublic-Key Cryptography [electronic resource] / Salomaa, Arto. author. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,1996.engCryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992.1. Classical Two-Way Cryptography -- 2. The Idea of Public Keys -- 3. Knapsack Systems -- 4. RSA -- 5. Other Bases of Cryptosystems -- 6. Cryptographic Protocols: Surprising Vistas for Communication -- Appendix A. Tutorial in Complexity Theory -- Appendix B. Tutorial in Number Theory -- Problems -- Historical and Bibliographical Remarks -- References.Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992.Computer science.Computer communication systems.Data encryption (Computer science).Coding theory.Computer scienceArtificial intelligence.Complexity, Computational.Computer Science.Artificial Intelligence (incl. Robotics).Data Encryption.Coding and Information Theory.Computer Communication Networks.Math Applications in Computer Science.Complexity.Springer eBookshttp://dx.doi.org/10.1007/978-3-662-03269-5URN:ISBN:9783662032695
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Data encryption (Computer science).
Coding theory.
Computer science
Artificial intelligence.
Complexity, Computational.
Computer Science.
Artificial Intelligence (incl. Robotics).
Data Encryption.
Coding and Information Theory.
Computer Communication Networks.
Math Applications in Computer Science.
Complexity.
Computer science.
Computer communication systems.
Data encryption (Computer science).
Coding theory.
Computer science
Artificial intelligence.
Complexity, Computational.
Computer Science.
Artificial Intelligence (incl. Robotics).
Data Encryption.
Coding and Information Theory.
Computer Communication Networks.
Math Applications in Computer Science.
Complexity.
spellingShingle Computer science.
Computer communication systems.
Data encryption (Computer science).
Coding theory.
Computer science
Artificial intelligence.
Complexity, Computational.
Computer Science.
Artificial Intelligence (incl. Robotics).
Data Encryption.
Coding and Information Theory.
Computer Communication Networks.
Math Applications in Computer Science.
Complexity.
Computer science.
Computer communication systems.
Data encryption (Computer science).
Coding theory.
Computer science
Artificial intelligence.
Complexity, Computational.
Computer Science.
Artificial Intelligence (incl. Robotics).
Data Encryption.
Coding and Information Theory.
Computer Communication Networks.
Math Applications in Computer Science.
Complexity.
Salomaa, Arto. author.
SpringerLink (Online service)
Public-Key Cryptography [electronic resource] /
description Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992.
format Texto
topic_facet Computer science.
Computer communication systems.
Data encryption (Computer science).
Coding theory.
Computer science
Artificial intelligence.
Complexity, Computational.
Computer Science.
Artificial Intelligence (incl. Robotics).
Data Encryption.
Coding and Information Theory.
Computer Communication Networks.
Math Applications in Computer Science.
Complexity.
author Salomaa, Arto. author.
SpringerLink (Online service)
author_facet Salomaa, Arto. author.
SpringerLink (Online service)
author_sort Salomaa, Arto. author.
title Public-Key Cryptography [electronic resource] /
title_short Public-Key Cryptography [electronic resource] /
title_full Public-Key Cryptography [electronic resource] /
title_fullStr Public-Key Cryptography [electronic resource] /
title_full_unstemmed Public-Key Cryptography [electronic resource] /
title_sort public-key cryptography [electronic resource] /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,
publishDate 1996
url http://dx.doi.org/10.1007/978-3-662-03269-5
work_keys_str_mv AT salomaaartoauthor publickeycryptographyelectronicresource
AT springerlinkonlineservice publickeycryptographyelectronicresource
_version_ 1756265894075432960