LEADER 03865nam0 2200757 i 450 001 VAN0113703 005 20230705094821.675 017 70$2N$a9783319219516 100 $a20180117d2015 |0itac50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $aAlgebra for applications$ecryptography, secret sharing, error-correcting, fingerprinting, compression$fArkadii Slinko 210 $a[Cham]$cSpringer$d2015 215 $aXIV, 328 p.$cill.$d24 cm 410 1$1001VAN0029443$12001 $aSpringer undergraduate mathematics series$1210 $aBerlin [etc.]$cSpringer 500 1$3VAN0234845$aAlgebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression$92440575 606 $a94A60$xCryptography [MSC 2020]$3VANC019699$2MF 606 $a68P30$xCoding and information theory (compaction, compression, models of communication, encoding schemes, etc.) [MSC 2020]$3VANC019979$2MF 606 $a11T71 Algebraic coding theory; cryptography [MSC 2020]$3VANC020456$2MF 606 $a14G50$xApplications to coding theory and cryptography of algebraic geometry [MSC 2020]$3VANC020731$2MF 606 $a14H52$xElliptic curves [MSC 2020]$3VANC021174$2MF 606 $a11Y16$xNumber-theoretic algorithms; complexity [MSC 2020]$3VANC021420$2MF 606 $a11Y11$xPrimality [MSC 2020]$3VANC021730$2MF 606 $a11Y05$xFactorization [MSC 2020]$3VANC021737$2MF 606 $a68P25$xData encryption [MSC 2020]$3VANC021877$2MF 606 $a11T06$xPolynomials over finite fields [MSC 2020]$3VANC022071$2MF 606 $a11C08$xPolynomials in number theory [MSC 2020]$3VANC022428$2MF 606 $a11A51$xFactorization; primality [MSC 2020]$3VANC023242$2MF 606 $a11A05$xMultiplicative structure; Euclidean algorithm; greatest common divisors [MSC 2020]$3VANC023952$2MF 606 $a94A62$xAuthentication, digital signatures and secret sharing [MSC 2020]$3VANC024292$2MF 606 $a12E20$xFinite fields (field-theoretic aspects) [MSC 2020]$3VANC026983$2MF 606 $a20B30$xSymmetric groups [MSC 2020]$3VANC029251$2MF 606 $a11C20$xMatrices, determinants in number theory [MSC 2020]$3VANC033735$2MF 606 $a20A05$xAxiomatics and elementary properties of groups [MSC 2020]$3VANC033736$2MF 610 $aBCH Codes$9KW:K 610 $aCryptography$9KW:K 610 $aCryptology$9KW:K 610 $aElgamal Cryptosystem$9KW:K 610 $aElliptic curves$9KW:K 610 $aError-Correcting Codes$9KW:K 610 $aEuler Totient Function$9KW:K 610 $aFactorization$9KW:K 610 $aFingerprinting Codes$9KW:K 610 $aFinite fields$9KW:K 610 $aFitingof?s Compression Code$9KW:K 610 $aIntegers$9KW:K 610 $aLagrange Interpolation$9KW:K 610 $aLinear Codes$9KW:K 610 $aLinear Secret Sharing Scheme$9KW:K 610 $aMiller-Rabin Pseudoprimality Test$9KW:K 610 $aPermutation Groups$9KW:K 610 $aPolynomials$9KW:K 610 $aPrefix Codes$9KW:K 610 $aPrimality Testing$9KW:K 620 $aCH$dCham$3VANL001889 700 1$aSlinko$bArkadii$3VANV087802$0734115 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20240614$gRICA 856 4 $uhttp://dx.doi.org/10.1007/978-3-319-21951-6$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$1IT-CE0120$2VAN08 912 $fN 912 $aVAN0113703 950 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$d08CONS e-book 0071 $e08eMF71 20180117 996 $aAlgebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression$92440575 997 $aUNICAMPANIA