|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-540-28520-5 |
003 |
DE-He213 |
005 |
20220113012428.0 |
007 |
cr nn 008mamaa |
008 |
100301s2005 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540285205
|9 978-3-540-28520-5
|
024 |
7 |
|
|a 10.1007/3-540-28520-2
|2 doi
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
072 |
|
7 |
|a UYA
|2 thema
|
082 |
0 |
4 |
|a 004.0151
|2 23
|
100 |
1 |
|
|a Rothe, Jörg.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Complexity Theory and Cryptology
|h [electronic resource] :
|b An Introduction to Cryptocomplexity /
|c by Jörg Rothe.
|
250 |
|
|
|a 1st ed. 2005.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2005.
|
300 |
|
|
|a XII, 478 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Texts in Theoretical Computer Science. An EATCS Series,
|x 1862-4502
|
505 |
0 |
|
|a to Cryptocomplexity -- Foundations of Computer Science and Mathematics -- Foundations of Complexity Theory -- Foundations of Cryptology -- Hierarchies Based on NP -- Randomized Algorithms and Complexity Classes -- RSA Cryptosystem, Primality, and Factoring -- Other Public-Key Cryptosystems and Protocols.
|
520 |
|
|
|a Modern cryptology employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research in complexity theory often is motivated by questions and problems arising in cryptology. This book takes account of this trend, and therefore its subject is what may be dubbed "cryptocomplexity,'' some sort of symbiosis of these two areas. This textbook is suitable for undergraduate and graduate students of computer science, mathematics, and engineering, and can be used for courses on complexity theory and cryptology, preferably by stressing their interrelation. Starting from scratch, it is an accessible introduction to cryptocomplexity and works its way to the frontiers of current research. It provides the necessary mathematical background, has numerous figures, exercises, and examples, and presents some central, up-to-date research topics and challenges. Due to its comprehensive bibliography and subject index, it is also a valuable source for researchers, teachers, and practitioners working in these fields.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Algorithms.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540802082
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642060540
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540221470
|
830 |
|
0 |
|a Texts in Theoretical Computer Science. An EATCS Series,
|x 1862-4502
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/3-540-28520-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|