Introduction to modern cryptography
"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles o...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2015]
|
Ausgabe: | second edition |
Schriftenreihe: | Chapman Hall, CRC cryptography and network security
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042153745 | ||
003 | DE-604 | ||
005 | 20190502 | ||
007 | t| | ||
008 | 141028s2015 xx a||| |||| 00||| eng d | ||
020 | |a 9781466570269 |c hardback |9 978-1-4665-7026-9 | ||
020 | |a 1466570261 |9 1-4665-7026-1 | ||
035 | |a (OCoLC)900419026 | ||
035 | |a (DE-599)BVBBV042153745 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-29T |a DE-91G |a DE-11 |a DE-20 |a DE-Aug4 |a DE-898 |a DE-634 |a DE-473 |a DE-92 |a DE-706 |a DE-355 | ||
082 | 0 | |a 005.82 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Katz, Jonathan |d 1974- |e Verfasser |0 (DE-588)133268101 |4 aut | |
245 | 1 | 0 | |a Introduction to modern cryptography |c Jonathan Katz (University of Maryland, College Park, MD, USA) ; Yehuda Lindell (Bar-Ilan University Ramat Gan, Israel) |
250 | |a second edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2015] | |
300 | |a xx, 583 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Chapman Hall, CRC cryptography and network security | |
500 | |a Includes bibliographical references and index | ||
520 | |a "Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lindell, Yehuda |d 1971- |e Verfasser |0 (DE-588)1031893946 |4 aut | |
856 | 4 | |u http://tocs.ulb.tu-darmstadt.de/347977812.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027593521&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027593521 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0104 DAT 465f 2010 A 8539(2) 0303 DAT 465f 2015 L 500(2) |
---|---|
DE-BY-TUM_katkey | 2041984 |
DE-BY-TUM_location | 01 03 |
DE-BY-TUM_media_number | 040008213534 040008213523 040008205330 040008205318 040008205329 040008205341 040008195973 040008195940 040008195939 040008195951 |
DE-BY-UBR_call_number | 471/ST 276 K19(2) 80/ST 276 K19(2) |
DE-BY-UBR_katkey | 5879808 |
DE-BY-UBR_location | 80 |
DE-BY-UBR_media_number | TEMP12594145 069041801255 |
_version_ | 1822755364840407040 |
adam_text | Titel: Introduction to modern cryptography
Autor: Katz, Jonathan
Jahr: 2015
Contents
Preface xv
I Introduction and Classical Cryptography
1 Introduction 3
1.1 Cryptography and Modern Cryptography 3
1.2 The Setting of Private-Key Encryption 4
1.3 Historical Ciphers and Their Cryptanalysis 8
1.4 Principles of Modern Cryptography 16
1.4.1 Principle 1 - Formal Definitions 17
1.4.2 Principle 2 - Precise Assumptions 20
1.4.3 Principle 3 - Proofs of Security 22
1.4.4 Provable Security and Real-World Security 22
References and Additional Reading 23
Exercises 24
2 Perfectly Secret Encryption 25
2.1 Definitions 26
2.2 The One-Time Päd 32
2.3 Limitations of Perfect Secrecy 35
2.4 *Shannon s Theorem 36
References and Additional Reading 37
Exercises 38
II Private-Key (Symmetrie) Cryptography
3 Private-Key Encryption 43
3.1 Computational Security 43
3.1.1 The Concrete Approach 44
3.1.2 The Asymptotic Approach 45
3.2 Defining Computationally Secure Encryption 52
3.2.1 The Basic Definition of Security 53
3.2.2 *Semantic Security 56
3.3 Constructing Secure Encryption Schemes 60
3.3.1 Pseudorandom Generators and Stream Ciphers .... 60
3.3.2 Proofs by Reduction 65
3.3.3 A Secure Fixed-Length Encryption Scheme 66
vii
viii
3.4 Stronger Security Notions 71
3.4.1 Security for Multiple Encryptions 71
3.4.2 Chosen-Plaintext Attacks and CPA-Security 73
3.5 Constructing CPA-Secure Encryption Schemes 77
3.5.1 Pseudorandom Functions and Block Ciphers 77
3.5.2 CPA-Secure Encryption from Pseudorandom Functions 82
3.6 Modes of Operation 86
3.6.1 Stream-Cipher Modes of Operation 86
3.6.2 Block-Cipher Modes of Operation 88
3.7 Chosen-Ciphertext Attacks 96
3.7.1 Defining CCA-Security 96
3.7.2 Padding-Oracle Attacks 98
References and Additional Reading 101
Exercises 102
4 Message Authentication Codes 107
4.1 Message Integrity 107
4.1.1 Secrecy vs. Integrity 107
4.1.2 Encryption vs. Message Authentication 108
4.2 Message Authentication Codes - Definitions 110
4.3 Constructing Secure Message Authentication Codes 116
4.3.1 A Fixed-Length MAC 116
4.3.2 Domain Extension for MACs 118
4.4 CBC-MAC 122
4.4.1 The Basic Construction 123
4.4.2 *Proof of Security 125
4.5 Authenticated Encryption 131
4.5.1 Definitions 131
4.5.2 Generic Constructions 132
4.5.3 Secure Communication Sessions 140
4.5.4 CCA-Secure Encryption 141
4.6 *Information-Theoretic MACs 142
4.6.1 Constructing Information-Theoretic MACs 143
4.6.2 Limitations on Information-Theoretic MACs 145
References and Additional Reading 146
Exercises 147
5 Hash Functions and Applications 153
5.1 Definitions 153
5.1.1 Collision Resistance 154
5.1.2 Weaker Notions of Security 156
5.2 Domain Extension: The Merkle-Damgard Transform .... 156
5.3 Message Authentication Using Hash Functions 158
5.3.1 Hash-and-MAC 159
5.3.2 HMAC 161
ix
5.4 Generic Attacks on Hash Functions 164
5.4.1 Birthday Attacks for Finding Collisions 164
5.4.2 Small-Space Birthday Attacks 166
5.4.3 *Time/Space Tradeoffs for Inverting Functions .... 168
5.5 The Random-Oracle Model 174
5.5.1 The Random-Oracle Model in Detail 175
5.5.2 Is the Random-Oracle Methodology Sound? 179
5.6 Additional Applications of Hash Functions 182
5.6.1 Fingerprinting and Deduplication 182
5.6.2 Merkle Trees 183
5.6.3 Password Hashing 184
5.6.4 Key Derivation 186
5.6.5 Commitment Schemes 187
References and Additional Reading 189
Exercises 189
6 Practical Constructions of Symmetrie-Key Primitives 193
6.1 Stream Ciphers 194
6.1.1 Linear-Feedback Shift Registers 195
6.1.2 Adding Nonlinearity 197
6.1.3 Trivium 198
6.1.4 RC4 199
6.2 Block Ciphers 202
6.2.1 Substitution-Permutation Networks 204
6.2.2 Feistel Networks 211
6.2.3 DES - The Data Encryption Standard 212
6.2.4 3DES: Increasing the Key Length of a Block Cipher . 220
6.2.5 AES - The Advanced Encryption Standard 223
6.2.6 *Differential and Linear Cryptanalysis 225
6.3 Hash Functions 231
6.3.1 Hash Functions from Block Ciphers 232
6.3.2 MD5 234
6.3.3 SHA-0, SHA-1, and SHA-2 234
6.3.4 SHA-3 (Keccak) 235
References and Additional Reading 236
Exercises 237
7 *Theoretical Constructions of Symmetrie-Key Primitives 241
7.1 One-Way Functions 242
7.1.1 Definitions 242
7.1.2 Candidate One-Way Functions 245
7.1.3 Hard-Core Predicates 246
7.2 From One-Way Functions to Pseudorandomness 248
7.3 Hard-Core Predicates from One-Way Functions 250
7.3.1 A Simple Case 250
X
7.3.2 A More Involved Case 251
7.3.3 The Pull Proof 254
7.4 Constructing Pseudorandom Generators 257
7.4.1 Pseudorandom Generators with Minimal Expansion . 258
7.4.2 Increasing the Expansion Factor 259
7.5 Constructing Pseudorandom Functions 265
7.6 Constructing (Strong) Pseudorandom Permutations 269
7.7 Assumptions for Private-Key Cryptography 273
7.8 Computational Indistinguishability 276
References and Additional Reading 278
Exercises 279
III Public-Key (Asymmetrie) Cryptography
8 Number Theory and Cryptographic Hardness Assumptions 285
8.1 Preliminaries and Basic Group Theory 287
8.1.1 Primes and Divisibility 287
8.1.2 Modular Arithmetic 289
8.1.3 Groups 291
8.1.4 The Group Z*N 295
8.1.5 *Isomorphisms and the Chinese Remainder Theorem . 297
8.2 Primes, Factoring, and RSA 302
8.2.1 Generating Random Primes 303
8.2.2 *Primality Testing 306
8.2.3 The Factoring Assumption 311
8.2.4 The RSA Assumption 312
8.2.5 *Relating the RSA and Factoring Assumptions .... 314
8.3 Cryptographic Assumptions in Cyclic Groups 316
8.3.1 Cyclic Groups and Generators 316
8.3.2 The Discrete-Logarithm/Diffie- Hellman Assumptions 319
8.3.3 Working in (Subgroups of) Z* 322
8.3.4 Elliptic Curves 325
8.4 * Cryptographic Applications 332
8.4.1 One-Way Functions and Permutations 332
8.4.2 Constructing Collision-Resistant Hash Functions . . . 335
References and Additional Reading 337
Exercises 338
9 *Algorithms for Factoring and Computing Discrete Loga-
rithms 341
9.1 Algorithms for Factoring 342
9.1.1 Pollard s p — 1 Algorithm 343
9.1.2 Pollard s Rho Algorithm 344
9.1.3 The Quadratic Sieve Algorithm 345
9.2 Algorithms for Computing Discrete Logarithms 348
xi
9.2.1 The Pohlig-Hellman Algorithm 350
9.2.2 The Baby-Step/Giant-Step Algorithm 352
9.2.3 Discrete Logarithms from Collisions 353
9.2.4 The Index Calculus Algorithm 354
9.3 Recommended Key Lengths 356
References and Additional Reading 357
Exercises 358
10 Key Management and the Public-Key Revolution 359
10.1 Key Distribution and Key Management 359
10.2 A Partial Solution: Key-Distribution Centers 361
10.3 Key Exchange and the Diffie Hellman Protocol 363
10.4 The Public-Key Revolution 370
References and Additional Reading 372
Exercises 373
11 Public-Key Encryption 375
11.1 Public-Key Encryption - An Overview 375
11.2 Definitions 378
11.2.1 Security against Chosen-Plaintext Attacks 379
11.2.2 Multiple Encryptions 381
11.2.3 Security against Chosen-Ciphertext Attacks 387
11.3 Hybrid Encryption and the KEM/DEM Paradigm 389
11.3.1 CPA-Security 393
11.3.2 CCA-Security 398
11.4 CDH/DDH-Based Encryption 399
11.4.1 El Gamal Encryption 400
11.4.2 DDH-Based Key Encapsulation 404
11.4.3 *A CDH-Based KEM in the Random-Oracle Model . 406
11.4.4 Chosen-Ciphertext Security and DHIES/ECIES .... 408
11.5 RSA Encryption 410
11.5.1 Piain RSA 410
11.5.2 Padded RSA and PKCS #1 vl.5 415
11.5.3 *CPA-Secure Encryption without Random Oracles . . 417
11.5.4 OAEP and RSA PKCS #1 v2.0 421
11.5.5 *A CCA-Secure KEM in the Random-Oracle Model . 425
11.5.6 RSA Implementation Issues and Pitfalls 429
References and Additional Reading 432
Exercises 433
12 Digital Signature Schemes 439
12.1 Digital Signatures - An Overview 439
12.2 Definitions 441
12.3 The Hash-and-Sign Paradigm 443
12.4 RSA Signatures 444
xii
12.4.1 Plain RSA 444
12.4.2 RSA-FDH and PKCS #1 v2.1 446
12.5 Signatures from the Discrete-Logarithm Problem 451
12.5.1 The Schnorr Signature Scheme 451
12.5.2 DSA and ECDSA 459
12.6 * Signatures from Hash Functions 461
12.6.1 Lamport s Signature Scheme 461
12.6.2 Chain-Based Signatures 465
12.6.3 Tree-Based Signatures 468
12.7 *Certificates and Public-Key Infrastructures 473
12.8 Putting It All Together - SSL/TLS 479
12.9 *Signcryption 481
References and Additional Reading 483
Exercises 484
13 * Advanced Topics in Public-Key Encryption 487
13.1 Public-Key Encryption from Trapdoor Permutations 487
13.1.1 Trapdoor Permutations 488
13.1.2 Public-Key Encryption from Trapdoor Permutations . 489
13.2 The Paillier Encryption Scheme 491
13.2.1 The Structure of Z*N2 492
13.2.2 The Paillier Encryption Scheme 494
13.2.3 Homomorphic Encryption 499
13.3 Secret Sharing and Threshold Encryption 501
13.3.1 Secret Sharing 501
13.3.2 Verifiable Secret Sharing 503
13.3.3 Threshold Encryption and Electronic Voting 505
13.4 The Goldwasser-Micali Encryption Scheme 507
13.4.1 Quadratic Residues Modulo a Prime 507
13.4.2 Quadratic Residues Modulo a Composite 510
13.4.3 The Quadratic Residuosity Assumption 514
13.4.4 The Goldwasser-Micali Encryption Scheme 515
13.5 The Rabin Encryption Scheme 518
13.5.1 Computing Modular Square Roots 518
13.5.2 A Trapdoor Permutation Based on Factoring 523
13.5.3 The Rabin Encryption Scheme 527
References and Additional Reading 528
Exercises 529
Index of Common Notation 533
xiii
Appendix A Mathematical Background 537
A.l Identities and Inequalities 537
A.2 Asymptotic Notation 537
A.3 Basic Probability 538
A.4 The Birthday Problem 542
A.5 *Finite Fields 544
Appendix B Basic Algorithmic Number Theory 547
B.l Integer Arithmetic 549
B.l.l Basic Operations 549
B.l.2 The Euclidean and Extended Euclidean Algorithms . 550
B.2 Modular Arithmetic 552
B.2.1 Basic Operations 552
B.2.2 Computing Modular Inverses 552
B.2.3 Modular Exponentiation 553
B.2.4 *Montgomery Multiplication 556
B.2.5 Choosing a Uniform Group Element 557
B.3 *Finding a Generator of a Cyclic Group 559
B.3.1 Group-Theoretic Background 559
B.3.2 Efficient Algorithms 561
References and Additional Reading 562
Exercises 562
References 563
Index 577
|
any_adam_object | 1 |
author | Katz, Jonathan 1974- Lindell, Yehuda 1971- |
author_GND | (DE-588)133268101 (DE-588)1031893946 |
author_facet | Katz, Jonathan 1974- Lindell, Yehuda 1971- |
author_role | aut aut |
author_sort | Katz, Jonathan 1974- |
author_variant | j k jk y l yl |
building | Verbundindex |
bvnumber | BV042153745 |
classification_rvk | SK 170 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)900419026 (DE-599)BVBBV042153745 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02721nam a2200445 c 4500</leader><controlfield tag="001">BV042153745</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190502 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">141028s2015 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466570269</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-4665-7026-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466570261</subfield><subfield code="9">1-4665-7026-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900419026</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042153745</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Katz, Jonathan</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)133268101</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to modern cryptography</subfield><subfield code="c">Jonathan Katz (University of Maryland, College Park, MD, USA) ; Yehuda Lindell (Bar-Ilan University Ramat Gan, Israel)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 583 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Chapman Hall, CRC cryptography and network security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. </subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lindell, Yehuda</subfield><subfield code="d">1971-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1031893946</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://tocs.ulb.tu-darmstadt.de/347977812.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027593521&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027593521</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV042153745 |
illustrated | Illustrated |
indexdate | 2024-12-24T04:15:27Z |
institution | BVB |
isbn | 9781466570269 1466570261 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027593521 |
oclc_num | 900419026 |
open_access_boolean | |
owner | DE-703 DE-29T DE-91G DE-BY-TUM DE-11 DE-20 DE-Aug4 DE-898 DE-BY-UBR DE-634 DE-473 DE-BY-UBG DE-92 DE-706 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-29T DE-91G DE-BY-TUM DE-11 DE-20 DE-Aug4 DE-898 DE-BY-UBR DE-634 DE-473 DE-BY-UBG DE-92 DE-706 DE-355 DE-BY-UBR |
physical | xx, 583 Seiten Illustrationen |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | CRC Press |
record_format | marc |
series2 | Chapman Hall, CRC cryptography and network security |
spellingShingle | Katz, Jonathan 1974- Lindell, Yehuda 1971- Introduction to modern cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4151278-9 |
title | Introduction to modern cryptography |
title_auth | Introduction to modern cryptography |
title_exact_search | Introduction to modern cryptography |
title_full | Introduction to modern cryptography Jonathan Katz (University of Maryland, College Park, MD, USA) ; Yehuda Lindell (Bar-Ilan University Ramat Gan, Israel) |
title_fullStr | Introduction to modern cryptography Jonathan Katz (University of Maryland, College Park, MD, USA) ; Yehuda Lindell (Bar-Ilan University Ramat Gan, Israel) |
title_full_unstemmed | Introduction to modern cryptography Jonathan Katz (University of Maryland, College Park, MD, USA) ; Yehuda Lindell (Bar-Ilan University Ramat Gan, Israel) |
title_short | Introduction to modern cryptography |
title_sort | introduction to modern cryptography |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie Einführung |
url | http://tocs.ulb.tu-darmstadt.de/347977812.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027593521&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT katzjonathan introductiontomoderncryptography AT lindellyehuda introductiontomoderncryptography |