Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1649200692
    Format: Online-Ressource
    ISBN: 9783540394662 , 3540119930 , 0387119930
    Series Statement: Lecture Notes in Computer Science 149
    Content: Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle — Hellman — Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret.
    Note: Literaturangaben
    Additional Edition: ISBN 9783540119937
    Additional Edition: Buchausg. u.d.T. Cryptography Berlin : Springer, 1983 ISBN 3540119930
    Additional Edition: ISBN 0387119930
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Beth, Thomas 1949-2005
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_021937699
    Format: VIII, 402 S. , Ill., graph. Darst.
    ISBN: 3540119930 , 0387119930
    Series Statement: Lecture notes in computer science 149
    Note: Literaturangaben. - In der Vorlage auch: Arbeitstagung über Kryptographie. - 1. Europäische Arbeitstagung über Kryptographie
    Additional Edition: Online-Ausg. Beth, Thomas, 1949 - 2005 Cryptography Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 1983 ISBN 9783540394662
    Additional Edition: ISBN 3540119930
    Additional Edition: ISBN 0387119930
    Additional Edition: Erscheint auch als Online-Ausgabe Beth, Thomas, 1949 - 2005 Cryptography Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 1983 ISBN 9783540394662
    Additional Edition: ISBN 3540119930
    Additional Edition: ISBN 0387119930
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Author information: Beth, Thomas 1949-2005
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947920854402882
    Format: VIII, 402 p. , online resource.
    ISBN: 9783540394662
    Series Statement: Lecture Notes in Computer Science, 149
    Note: Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle — Hellman — Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540119937
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948621381602882
    Format: VIII, 402 p. , online resource.
    Edition: 1st ed. 1983.
    ISBN: 9783540394662
    Series Statement: Lecture Notes in Computer Science, 149
    Note: Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle - Hellman - Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662204085
    Additional Edition: Printed edition: ISBN 9783540119937
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    edoccha_9959185685002883
    Format: 1 online resource (VIII, 402 p.)
    Edition: 1st ed. 1983.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-39466-4
    Series Statement: Lecture Notes in Computer Science, 149
    Note: Bibliographic Level Mode of Issuance: Monograph , Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle — Hellman — Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-11993-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edocfu_9959185685002883
    Format: 1 online resource (VIII, 402 p.)
    Edition: 1st ed. 1983.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-39466-4
    Series Statement: Lecture Notes in Computer Science, 149
    Note: Bibliographic Level Mode of Issuance: Monograph , Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle — Hellman — Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-11993-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almafu_9959185685002883
    Format: 1 online resource (VIII, 402 p.)
    Edition: 1st ed. 1983.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-39466-4
    Series Statement: Lecture Notes in Computer Science, 149
    Note: Bibliographic Level Mode of Issuance: Monograph , Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle — Hellman — Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-11993-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783540294962?
Did you mean 9783540094661?
Did you mean 9783540194262?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages