LEADER 03876nam0 2200757 i 450 001 VAN00113703 005 20240806100749.602 017 70$2N$a9783319219516 100 $a20180117d2015 |0itac50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $aAlgebra for applications$ecryptography, secret sharing, error-correcting, fingerprinting, compression$fArkadii Slinko 210 $a[Cham]$cSpringer$d2015 215 $aXIV, 328 p.$cill.$d24 cm 410 1$1001VAN00029443$12001 $aSpringer undergraduate mathematics series$1210 $aBerlin [etc.]$cSpringer$d1998- 500 1$3VAN00234845$aAlgebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression$92440575 606 $a11A05$xMultiplicative structure; Euclidean algorithm; greatest common divisors [MSC 2020]$3VANC023952$2MF 606 $a11A51$xFactorization; primality [MSC 2020]$3VANC023242$2MF 606 $a11C08$xPolynomials in number theory [MSC 2020]$3VANC022428$2MF 606 $a11C20$xMatrices, determinants in number theory [MSC 2020]$3VANC033735$2MF 606 $a11T06$xPolynomials over finite fields [MSC 2020]$3VANC022071$2MF 606 $a11T71 Algebraic coding theory; cryptography [MSC 2020]$3VANC020456$2MF 606 $a11Y05$xFactorization [MSC 2020]$3VANC021737$2MF 606 $a11Y11$xPrimality [MSC 2020]$3VANC021730$2MF 606 $a11Y16$xNumber-theoretic algorithms; complexity [MSC 2020]$3VANC021420$2MF 606 $a12E20$xFinite fields (field-theoretic aspects) [MSC 2020]$3VANC026983$2MF 606 $a14G50$xApplications to coding theory and cryptography of algebraic geometry [MSC 2020]$3VANC020731$2MF 606 $a14H52$xElliptic curves [MSC 2020]$3VANC021174$2MF 606 $a20A05$xAxiomatics and elementary properties of groups [MSC 2020]$3VANC033736$2MF 606 $a20B30$xSymmetric groups [MSC 2020]$3VANC029251$2MF 606 $a68P25$xData encryption [MSC 2020]$3VANC021877$2MF 606 $a68P30$xCoding and information theory (compaction, compression, models of communication, encoding schemes, etc.) [MSC 2020]$3VANC019979$2MF 606 $a94A60$xCryptography [MSC 2020]$3VANC019699$2MF 606 $a94A62$xAuthentication, digital signatures and secret sharing [MSC 2020]$3VANC024292$2MF 610 $aBCH Codes$9KW:K 610 $aCryptography$9KW:K 610 $aCryptology$9KW:K 610 $aElgamal Cryptosystem$9KW:K 610 $aElliptic curves$9KW:K 610 $aError-Correcting Codes$9KW:K 610 $aEuler Totient Function$9KW:K 610 $aFactorization$9KW:K 610 $aFingerprinting Codes$9KW:K 610 $aFinite fields$9KW:K 610 $aFitingof?s Compression Code$9KW:K 610 $aIntegers$9KW:K 610 $aLagrange Interpolation$9KW:K 610 $aLinear Codes$9KW:K 610 $aLinear Secret Sharing Scheme$9KW:K 610 $aMiller-Rabin Pseudoprimality Test$9KW:K 610 $aPermutation Groups$9KW:K 610 $aPolynomials$9KW:K 610 $aPrefix Codes$9KW:K 610 $aPrimality Testing$9KW:K 620 $aCH$dCham$3VANL001889 700 1$aSlinko$bArkadii$3VANV087802$0734115 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20250530$gRICA 856 4 $uhttp://dx.doi.org/10.1007/978-3-319-21951-6$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$1IT-CE0120$2VAN08 912 $fN 912 $aVAN00113703 950 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$d08DLOAD e-book 0071 $e08eMF71 20180117 996 $aAlgebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression$92440575 997 $aUNICAMPANIA LEADER 02107nam0 22004933i 450 001 VAN00268877 005 20240806101526.511 017 70$2N$a9781461386438 100 $a20231215d1986 |0itac50 ba 101 $aeng 102 $aUS 105 $a|||| ||||| 200 1 $aNon-Uniform Random Variate Generation$fLuc Devroye 210 $aNew York$cSpringer-Verlag$d1986 215 $axvi, 843 p.$cill.$d24 cm 606 $a62G05$xNonparametric estimation [MSC 2020]$3VANC029306$2MF 606 $a62H12$xEstimation in multivariate analysis [MSC 2020]$3VANC021210$2MF 606 $a65-XX$xNumerical analysis [MSC 2020]$3VANC019772$2MF 606 $a65C10$xRandom number generation in numerical analysis [MSC 2020]$3VANC021613$2MF 606 $a65Cxx$xProbabilistic methods, stochastic differential equations [MSC 2020]$3VANC028329$2MF 606 $a68Uxx$xComputing methodologies and applications [MSC 2020]$3VANC019673$2MF 606 $a90Bxx$xOperations research and management science [MSC 2020]$3VANC019945$2MF 606 $a91Bxx$xMathematical economics [MSC 2020]$3VANC024654$2MF 610 $aArea$9KW:K 610 $aComputer$9KW:K 610 $aForms$9KW:K 610 $aGenerator$9KW:K 610 $aModels$9KW:K 610 $aObjects$9KW:K 610 $aRandom variables$9KW:K 610 $aRandomness$9KW:K 610 $aSets$9KW:K 610 $aVariables$9KW:K 620 $aUS$dNew York$3VANL000011 700 1$aDevroye$bLuc$3VANV050373$060985 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20250829$gRICA 856 4 $uhttps://doi.org/10.1007/978-1-4613-8643-8$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$1IT-CE0120$2VAN08 912 $fN 912 $aVAN00268877 950 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$d08DLOAD e-book 7786 $e08eMF7786 20231218 996 $aNon-Uniform Random Variate Generation$9438321 997 $aUNICAMPANIA