Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV035987636
    Format: 1 Online-Ressource (489 S.)
    ISBN: 3540160760 , 0387160760
    Series Statement: Lecture notes in computer science 209
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift
    Author information: Beth, Thomas 1949-2005
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1649203977
    Format: Online-Ressource
    ISBN: 9783540397571
    Series Statement: Lecture Notes in Computer Science 209
    Content: General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access.
    Note: Literaturangaben , section 1. General theory, classical methods -- section 2. Public-key systems -- section 3. Number theoretical papers -- section 4. Channels, networks, key distribution, protocols -- section 5. Applications -- section 6. Smart cards.
    Additional Edition: ISBN 9783540160762
    Additional Edition: Druckausg. Advances in cryptology Berlin [u.a.] : Springer, 1985 ISBN 3540160760
    Additional Edition: ISBN 0387160760
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Beth, Thomas 1949-2005
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_BV000437087
    Format: 489 S.
    ISBN: 3-540-16076-0 , 0-387-16076-0
    Series Statement: Lecture notes in computer science 209
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift ; Konferenzschrift
    Author information: Beth, Thomas, 1949-2005
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_9959185684702883
    Format: 1 online resource (482 p.)
    Edition: 1st ed. 1985.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 1-280-80476-9 , 9786610804764 , 3-540-39757-4
    Series Statement: Lecture Notes in Computer Science, 209
    Note: Held at the University of Paris, Sorbonne. , General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-16076-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV000437087
    Format: 489 S.
    ISBN: 3540160760 , 0387160760
    Series Statement: Lecture notes in computer science 209
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift
    Author information: Beth, Thomas 1949-2005
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_BV000437087
    Format: 489 S.
    ISBN: 3-540-16076-0 , 0-387-16076-0
    Series Statement: Lecture notes in computer science 209
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift
    Author information: Beth, Thomas 1949-2005
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9947920874002882
    Format: X, 494 p. , online resource.
    ISBN: 9783540397571
    Series Statement: Lecture Notes in Computer Science, 209
    Note: General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540160762
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9948621334702882
    Format: X, 494 p. , online resource.
    Edition: 1st ed. 1985.
    ISBN: 9783540397571
    Series Statement: Lecture Notes in Computer Science, 209
    Note: General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA's L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662189535
    Additional Edition: Printed edition: ISBN 9783540160762
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    edoccha_9959185684702883
    Format: 1 online resource (482 p.)
    Edition: 1st ed. 1985.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 1-280-80476-9 , 9786610804764 , 3-540-39757-4
    Series Statement: Lecture Notes in Computer Science, 209
    Note: Held at the University of Paris, Sorbonne. , General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-16076-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    edocfu_9959185684702883
    Format: 1 online resource (482 p.)
    Edition: 1st ed. 1985.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 1-280-80476-9 , 9786610804764 , 3-540-39757-4
    Series Statement: Lecture Notes in Computer Science, 209
    Note: Held at the University of Paris, Sorbonne. , General Theory, Classical Methods -- Cryptology and Complexity Theories -- On Cryptosystems Based on Polynomials and Finite Fields -- Algebraical Structures of Cryptographic Transformations -- Non Linear Non Commutative Functions for Data Integrity -- Wire-Tap Channel II -- Equivocations for Homophonic Ciphers -- Propagation Characteristics of the DES -- Linear Ciphers and Random Sequence Generators with Multiple Clocks -- The Stop-and-Go-Generator -- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers -- On the linear complexity of cascaded sequences -- Public-Key Systems -- RSA-bits are 0.5 + ? secure -- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract) -- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme -- A New Trapdoor Knapsack Public Key Cryptosystem -- RSA Chips (Past/Present/Future) (Extended abstract) -- Number Theoretical Papers -- The Quadratic Sieve Factoring Algorithm -- Status Report on Factoring (At the Sandia National Laboratories) -- Strong Primes are Easy to Find -- Discrete logarithms in finite fields and their cryptographic significance -- Channels, Networks, Key Distribution, Protocols -- User Functions for the Generation and Distribution of Encipherment Keys -- An Optimal Class of Symmetric Key Generation Systems -- On the Use of the Binary Multiplying Channel in a Private Communication System -- Secrecy and Privacy in a Local Area Network Environment -- The Subliminal Channel and Digital Signatures -- A Provably Secure Oblivious Transfer Protocol -- On Concurrent Identification Protocols (Extended Abstract) -- Applications -- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System -- Security of Transportable Computerized Files -- Encryption and Key Management for the ECS Statellite Service -- An Encryption and Authentification Procedure for Telesurveillance Systems -- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques -- Smart Cards -- Session on Smart Cards Tuesday April 10 -- Smart Card Applications in Security and Data Protection -- Bull CP8 Smart Card Uses in Cryptology -- Estimation of some Encryption Functions Implemented into Smart Cards -- Smart Cards and Conditional Access. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-16076-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 3540107630?
Did you mean 3540060790?
Did you mean 3540060960?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages