000 | 03575nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-0-387-28835-2 | ||
003 | DE-He213 | ||
005 | 20160302161944.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 xxu| s |||| 0|eng d | ||
020 |
_a9780387288352 _9978-0-387-28835-2 |
||
024 | 7 |
_a10.1007/0-387-28835-X _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aBaig�neres, Thomas. _eauthor. |
|
245 | 1 | 2 |
_aA Classical Introduction to Cryptography Exercise Book _h[electronic resource] / _cby Thomas Baig�neres, Yi Lu, Serge Vaudenay, Pascal Junod, Jean Monnerat. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2006. |
|
300 |
_aXIV, 254 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPrehistory of Cryptography -- Conventional Cryptography -- Dedicated Conventional Cryptographic Primitives -- Conventional Security Analysis -- Security Protocols with Conventional Cryptography -- Algorithmic Algebra -- Algorithmic Number Theory -- Elements of Complexity Theory -- Public Key Cryptography -- Digital Signatures -- Cryptographic Protocols -- From Cryptography to Communication Security. | |
520 | _aThis companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aInput-output equipment (Computers). | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aComputers. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aTheory of Computation. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aInput/Output and Data Communications. |
700 | 1 |
_aLu, Yi. _eauthor. |
|
700 | 1 |
_aVaudenay, Serge. _eauthor. |
|
700 | 1 |
_aJunod, Pascal. _eauthor. |
|
700 | 1 |
_aMonnerat, Jean. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9780387279343 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/0-387-28835-X |
912 | _aZDB-2-SCS | ||
999 |
_c175053 _d175053 |