000 | 03183nam a22004575i 4500 | ||
---|---|---|---|
001 | 978-3-540-39466-2 | ||
003 | DE-He213 | ||
005 | 20160624101944.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1983 gw | s |||| 0|eng d | ||
020 |
_a9783540394662 _9978-3-540-39466-2 |
||
024 | 7 |
_a10.1007/3-540-39466-4 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM031000 _2bisacsh |
|
082 | 0 | 4 |
_a003.54 _223 |
245 | 1 | 0 |
_aCryptography _h[electronic resource] : _bProceedings of the Workshop on Cryptography Burg Feuerstein, Germany, March 29–April 2, 1982 / _cedited by Thomas Beth. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1983. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1983. |
|
300 |
_aVIII, 402 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v149 |
|
505 | 0 | _aClassical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle — Hellman — Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aCoding theory. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aCoding and Information Theory. |
700 | 1 |
_aBeth, Thomas. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540119937 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v149 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/3-540-39466-4 |
942 |
_2EBK4655 _cEBK |
||
999 |
_c33949 _d33949 |