Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Erscheinungszeitraum
Fachgebiete(RVK)
Schlagwörter
Zugriff
  • 1
    Buch
    Buch
    New York, NY [u.a.] : Springer
    UID:
    b3kat_BV016972717
    Umfang: XIV, 465 S. , Ill., graph. Darst.
    ISBN: 0387003118
    Serie: Springer professional computing
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    RVK:
    Schlagwort(e): Kryptologie ; Geheimnisprinzip
    URL: Cover
    Mehr zum Autor: Salomon, David 1938-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    New York, NY :Springer New York :
    UID:
    almahu_9948621148702882
    Umfang: XIV, 465 p. 45 illus. , online resource.
    Ausgabe: 1st ed. 2003.
    ISBN: 9780387217079
    Inhalt: Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.
    Anmerkung: Basic Concepts -- The Caesar Cipher -- The Affine Cipher -- The One-Time Pad -- Kerckhoffs' Principle -- I. Data Encryption -- 1 Monoalphabetic Substitution Ciphers -- 2 Transposition Ciphers -- 3 Polyalphabetic Substitution Ciphers -- 4 Random Numbers -- 5 The Enigma -- 6 Stream Ciphers -- 7 Block Ciphers -- 8 Public-Key Cryptography -- 9 Quantum Cryptography -- II. Data Hiding -- 10 Data Hiding in Text -- 11 Data Hiding in Images -- 12 Data Hiding: Other Methods -- III. Essential Resources -- Appendixes -- A Convolution -- A.1 One-Dimensional Convolution -- A.2 Two-Dimensional Convolution -- B Hashing -- B.1 Hash Tables -- B.2 Hash Functions -- B.3 Collision Handling -- B.4 Secure Hash Functions -- C Cyclic Redundancy Codes -- D Galois Fields -- D.1 Field Definitions and Operations -- D.2 GF(256) and Rijndael -- D.3 Polynomial Arithmetic -- Answers to Exercises -- Cryptography Timeline.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9780387003115
    Weitere Ausg.: Printed edition: ISBN 9781441918161
    Weitere Ausg.: Printed edition: ISBN 9781468495461
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    New York, NY : Springer
    UID:
    gbv_748930507
    Umfang: Online-Ressource (XIV, 465 p. 122 illus) , digital
    Ausgabe: Reproduktion Springer eBook Collection. Computer Science
    ISBN: 9780387217079
    Inhalt: Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security
    Weitere Ausg.: ISBN 9781441918161
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9780387003115
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9781441918161
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9781468495461
    Sprache: Englisch
    URL: Volltext  (lizenzpflichtig)
    Mehr zum Autor: Salomon, David 1938-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 0387003126?
Meinten Sie 038700310x?
Meinten Sie 0387002111?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz