feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Die angezeigten Daten werden derzeit aktualisiert.
Derzeit steht der Fernleihindex leider nicht zur Verfügung.
Export
Filter
  • Brandenburg  (3)
  • BTU Cottbus  (3)
  • EUV Frankfurt  (1)
  • HU Berlin
  • SLB Potsdam
  • Abraham Geiger Kolleg
  • SB Zossen
  • Fouque-Bibliothek Brandenburg
  • SB Oranienburg
  • MPI Bildungsforschung
  • Inst. Menschenrechte
  • Bauhaus-Archiv Berlin
  • Bundesarchiv
  • GB Zeuthen
  • Koblitz, Neal  (3)
  • Licensed  (3)
Type of Medium
Language
Region
Library
  • BTU Cottbus  (3)
  • EUV Frankfurt  (1)
  • HU Berlin
  • SLB Potsdam
  • Abraham Geiger Kolleg
  • +
Years
Subjects(RVK)
Access
  • 1
    UID:
    b3kat_BV035261438
    Format: 1 Online-Ressource (XII, 415 S. , graph. Darst.)
    ISBN: 3540615121
    Series Statement: Lecture notes in computer science 1109
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    Keywords: Kryptologie ; Konferenzschrift
    Author information: Koblitz, Neal 1948-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New York, NY : Springer New York
    UID:
    b3kat_BV042419284
    Format: 1 Online-Ressource (X, 235 p)
    Edition: Second Edition
    ISBN: 9781441985927 , 9781461264422
    Series Statement: Graduate Texts in Mathematics 114
    Note: . . . both Gauss and lesser mathematicians may be justified in rejoicing that there is one science [number theory] at any rate, and that their own, whose very remoteness from ordinary human activities should keep it gentle and clean. - G. H. Hardy, A Mathematician's Apology, 1940 G. H. Hardy would have been surprised and probably displeased with the increasing interest in number theory for application to "ordinary human activities" such as information transmission (error-correcting codes) and cryptography (secret codes). Less than a half-century after Hardy wrote the words quoted above, it is no longer inconceivable (though it hasn't happened yet) that the N. S. A. (the agency for U. S. government work on cryptography) will demand prior review and clearance before publication of theoretical research papers on certain types of number theory. In part it is the dramatic increase in computer power and sophistication that has influenced some of the questions being studied by number theorists, giving rise to a new branch of the subject, called "computational number theory. " This book presumes almost no background in algebra or number theory. Its purpose is to introduce the reader to arithmetic topics, both ancient and very modern, which have been at the center of interest in applications, especially in cryptography. For this reason we take an algorithmic approach, emphasizing estimates of the efficiency of the techniques that arise from the theory
    Language: English
    Keywords: Kryptologie ; Zahlentheorie ; Einführung
    Author information: Koblitz, Neal 1948-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    UID:
    b3kat_BV042423274
    Format: 1 Online-Ressource (IX, 206 Seiten) , Illustrationen, Diagramme
    ISBN: 9783662036426
    Series Statement: Algorithms and Computation in Mathematics 3
    Note: This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: "... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D.Burmester, Mathematical Reviews 2002 "... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 "... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E.Leiss, Computing Reviews 1998
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-540-63446-1
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-642-08332-7
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    RVK:
    Keywords: Kryptologie ; Algebraische Methode ; Kryptologie ; Algebraische Geometrie ; Lehrbuch
    Author information: Koblitz, Neal 1948-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages