| 000 | 03608nam a22005535i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-28835-2 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083943.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2006 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387288352 _a99780387288352 |
||
| 024 | 7 |
_a10.1007/0-387-28835-X _2doi |
|
| 082 | 0 | 4 |
_a005.82 _223 |
| 100 | 1 |
_aBaigèneres, Thomas. _eauthor. |
|
| 245 | 1 | 2 |
_aA Classical Introduction to Cryptography Exercise Book _h[recurso electrónico] / _cby Thomas Baigèneres, Yi Lu, Serge Vaudenay, Pascal Junod, Jean Monnerat. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2006. |
|
| 300 |
_aXIV, 254 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aPrehistory of Cryptography -- Conventional Cryptography -- Dedicated Conventional Cryptographic Primitives -- Conventional Security Analysis -- Security Protocols with Conventional Cryptography -- Algorithmic Algebra -- Algorithmic Number Theory -- Elements of Complexity Theory -- Public Key Cryptography -- Digital Signatures -- Cryptographic Protocols -- From Cryptography to Communication Security. | |
| 520 | _aThis companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aDATA TRANSMISSION SYSTEMS. | |
| 650 | 0 | _aCOMPUTER NETWORK ARCHITECTURES. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aCODING THEORY. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aCODING AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aINPUT/OUTPUT AND DATA COMMUNICATIONS. |
| 650 | 2 | 4 | _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS. |
| 700 | 1 |
_aLu, Yi. _eauthor. |
|
| 700 | 1 |
_aVaudenay, Serge. _eauthor. |
|
| 700 | 1 |
_aJunod, Pascal. _eauthor. |
|
| 700 | 1 |
_aMonnerat, Jean. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387279343 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/0-387-28835-X _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c56880 _d56880 |
||