|
|
|
|
LEADER |
03590nam a22005775i 4500 |
001 |
978-0-387-28835-2 |
003 |
DE-He213 |
005 |
20151204163814.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387288352
|9 978-0-387-28835-2
|
024 |
7 |
|
|a 10.1007/0-387-28835-X
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
|
|a Baigèneres, Thomas.
|e author.
|
245 |
1 |
2 |
|a A Classical Introduction to Cryptography Exercise Book
|h [electronic resource] /
|c by Thomas Baigèneres, Yi Lu, Serge Vaudenay, Pascal Junod, Jean Monnerat.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2006.
|
300 |
|
|
|a XIV, 254 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Prehistory of Cryptography -- Conventional Cryptography -- Dedicated Conventional Cryptographic Primitives -- Conventional Security Analysis -- Security Protocols with Conventional Cryptography -- Algorithmic Algebra -- Algorithmic Number Theory -- Elements of Complexity Theory -- Public Key Cryptography -- Digital Signatures -- Cryptographic Protocols -- From Cryptography to Communication Security.
|
520 |
|
|
|a This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Input-output equipment (Computers).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Input/Output and Data Communications.
|
700 |
1 |
|
|a Lu, Yi.
|e author.
|
700 |
1 |
|
|a Vaudenay, Serge.
|e author.
|
700 |
1 |
|
|a Junod, Pascal.
|e author.
|
700 |
1 |
|
|a Monnerat, Jean.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387279343
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/0-387-28835-X
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|