|
|
|
|
LEADER |
03029nam a22005295i 4500 |
001 |
978-3-540-25942-8 |
003 |
DE-He213 |
005 |
20151204171159.0 |
007 |
cr nn 008mamaa |
008 |
121227s2004 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540259428
|9 978-3-540-25942-8
|
024 |
7 |
|
|a 10.1007/b97045
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.0151
|2 23
|
100 |
1 |
|
|a Neuenschwander, Daniel.
|e author.
|
245 |
1 |
0 |
|a Probabilistic and Statistical Methods in Cryptology
|h [electronic resource] :
|b An Introduction by Selected Topics /
|c by Daniel Neuenschwander.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2004.
|
300 |
|
|
|a X, 162 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3028
|
505 |
0 |
|
|a 1 Classical Polyalphabetic Substitution Ciphers -- 2 RSA and Probabilistic Prime Number Tests -- 3 Factorization with Quantum Computers: Shor’s Algorithm -- 4 Physical Random-Number Generators -- 5 Pseudo-random Number Generators -- 6 An Information Theory Primer -- 7 Tests for (Pseudo-)Random Number Generators -- 8 Diffie-Hellman Key Exchange -- 9 Differential Cryptanalysis -- 10 Semantic Security -- 11 *Algorithmic Complexity -- 12 Birthday Paradox and Meet-in-the-Middle Attack -- 13 Quantum Cryptography.
|
520 |
|
|
|a Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathematics. This text is devoted to the study of stochastic aspects of cryptology. Besides classical topics from cryptology, the author presents chapters on probabilistic prime number tests, factorization with quantum computers, random-number generators, pseudo-random-number generators, information theory, and the birthday paradox and meet-in-the-middle attack. In the light of the vast literature on stochastic results relevant for cryptology, this book is intended as an invitation and introduction for students, researchers, and practitioners to probabilistic and statistical issues in cryptology.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Probabilities.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Probability Theory and Stochastic Processes.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540220015
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3028
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b97045
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|