|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-28835-2 |
003 |
DE-He213 |
005 |
20220118174214.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387288352
|9 978-0-387-28835-2
|
024 |
7 |
|
|a 10.1007/0-387-28835-X
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
100 |
1 |
|
|a Baigneres, Thomas.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
2 |
|a A Classical Introduction to Cryptography Exercise Book
|h [electronic resource] /
|c by Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay.
|
250 |
|
|
|a 1st ed. 2006.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2006.
|
300 |
|
|
|a XIV, 254 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Prehistory of Cryptography -- Conventional Cryptography -- Dedicated Conventional Cryptographic Primitives -- Conventional Security Analysis -- Security Protocols with Conventional Cryptography -- Algorithmic Algebra -- Algorithmic Number Theory -- Elements of Complexity Theory -- Public Key Cryptography -- Digital Signatures -- Cryptographic Protocols -- From Cryptography to Communication Security.
|
520 |
|
|
|a This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Computer input-output equipment.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Input/Output and Data Communications.
|
700 |
1 |
|
|a Junod, Pascal.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Lu, Yi.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Monnerat, Jean.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Vaudenay, Serge.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441939128
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387508603
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387279343
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/0-387-28835-X
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|