|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn906180651 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150403s2015 flua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d CUS
|d E7B
|d UMI
|d YDXCP
|d CRCPR
|d IDEBK
|d COO
|d DEBBG
|d EBLCP
|d OCLCF
|d ORU
|d DEBSZ
|d ORU
|d IDB
|d OCLCA
|d OCLCQ
|d MERUC
|d CEF
|d OCLCQ
|d WYU
|d TYFRS
|d AU@
|d OCLCQ
|d K6U
|d OCLCO
|d VT2
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|
019 |
|
|
|a 908078785
|a 908853451
|a 1066462988
|a 1300784713
|
020 |
|
|
|a 9781584888376
|q (electronic bk.)
|
020 |
|
|
|a 1584888377
|q (electronic bk.)
|
020 |
|
|
|a 9781466527232
|
020 |
|
|
|a 1466527234
|
020 |
|
|
|a 1584888369
|
020 |
|
|
|a 9781584888369
|
020 |
|
|
|z 9781584888369
|
029 |
1 |
|
|a AU@
|b 000056081807
|
029 |
1 |
|
|a DEBBG
|b BV042683377
|
029 |
1 |
|
|a DEBBG
|b BV043607395
|
029 |
1 |
|
|a DEBSZ
|b 446585823
|
029 |
1 |
|
|a DEBSZ
|b 44941454X
|
029 |
1 |
|
|a DEBSZ
|b 453328016
|
029 |
1 |
|
|a GBVCP
|b 82172780X
|
029 |
1 |
|
|a GBVCP
|b 823578577
|
035 |
|
|
|a (OCoLC)906180651
|z (OCoLC)908078785
|z (OCoLC)908853451
|z (OCoLC)1066462988
|z (OCoLC)1300784713
|
037 |
|
|
|a CL0500000590
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b G66 2015
|
072 |
|
7 |
|a COM
|x 083000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a González Vasco, Maria Isabel,
|e author.
|
245 |
1 |
0 |
|a Group theoretic cryptography /
|c María Isabel González Vasco, Rainer Steinwandt.
|
264 |
|
1 |
|a Boca Raton, FL :
|b CRC Press LLC,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (xvii, 230 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Chapman & Hall/CRC cryptography and network security
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a 1. Preliminaries -- 2. Public-key encryption -- 3. Secret-key encryption -- 4. Other cryptographic constructions.
|
520 |
|
|
|a "Supplies an introduction to cryptography for those interested in group theory -- Offers formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory -- Provides full proofs of important theorems -- Emphasizes algorithmic aspects -- Includes problems and selected solutions"--
|c Provided by publisher
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Cryptography.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
700 |
1 |
|
|a Steinwandt, Rainer,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a González Vasco, Maria Isabel.
|t Group theoretic cryptography.
|d Boca Raton, FL : CRC Press LLC, [2015]
|z 9781584888369
|w (OCoLC)907678277
|
830 |
|
0 |
|a Chapman & Hall/CRC cryptography and network security.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781584888369/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1619960
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11041789
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 974061
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis30037072
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429136603
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n CAH00CE8369PDF
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11632309
|
994 |
|
|
|a 92
|b IZTAP
|