LEADER 03959nam0 22007693i 450 001 VAN0248643 005 20230529123446.348 017 70$2N$a9783030440749 100 $a20220726d2020 |0itac50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $aAlgebra for applications$ecryptography, secret sharing, error-correcting, fingerprinting, compression$fArkadii Slinko 205 $a2. ed 210 $aCham$cSpringer$d2020 215 $axiv, 368 p.$cill.$d24 cm 410 1$1001VAN0029443$12001 $aSpringer undergraduate mathematics series$1210 $aBerlin [etc.]$cSpringer 500 1$3VAN0234845$aAlgebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression$92440575 606 $a94A60$xCryptography [MSC 2020]$3VANC019699$2MF 606 $a68P30$xCoding and information theory (compaction, compression, models of communication, encoding schemes, etc.) [MSC 2020]$3VANC019979$2MF 606 $a11T71 Algebraic coding theory; cryptography [MSC 2020]$3VANC020456$2MF 606 $a14G50$xApplications to coding theory and cryptography of algebraic geometry [MSC 2020]$3VANC020731$2MF 606 $a14H52$xElliptic curves [MSC 2020]$3VANC021174$2MF 606 $a11Y16$xNumber-theoretic algorithms; complexity [MSC 2020]$3VANC021420$2MF 606 $a11Y11$xPrimality [MSC 2020]$3VANC021730$2MF 606 $a11Y05$xFactorization [MSC 2020]$3VANC021737$2MF 606 $a68P25$xData encryption [MSC 2020]$3VANC021877$2MF 606 $a11T06$xPolynomials over finite fields [MSC 2020]$3VANC022071$2MF 606 $a11C08$xPolynomials in number theory [MSC 2020]$3VANC022428$2MF 606 $a11A51$xFactorization; primality [MSC 2020]$3VANC023242$2MF 606 $a11A05$xMultiplicative structure; Euclidean algorithm; greatest common divisors [MSC 2020]$3VANC023952$2MF 606 $a94A62$xAuthentication, digital signatures and secret sharing [MSC 2020]$3VANC024292$2MF 606 $a12E20$xFinite fields (field-theoretic aspects) [MSC 2020]$3VANC026983$2MF 606 $a20B30$xSymmetric groups [MSC 2020]$3VANC029251$2MF 606 $a11C20$xMatrices, determinants in number theory [MSC 2020]$3VANC033735$2MF 606 $a20A05$xAxiomatics and elementary properties of groups [MSC 2020]$3VANC033736$2MF 610 $aBCH Code$9KW:K 610 $aDiffie-Hellman$9KW:K 610 $aDigital signature$9KW:K 610 $aElgamal Cryptosystem$9KW:K 610 $aError-Correcting Codes$9KW:K 610 $aEuler Totient Function$9KW:K 610 $aFingerprinting Codes$9KW:K 610 $aFitingof Compression Code$9KW:K 610 $aHuffman compression code$9KW:K 610 $aIdeal secret sharing scheme$9KW:K 610 $aLagrange Interpolation$9KW:K 610 $aLinear Secret Sharing Scheme$9KW:K 610 $aMiller-Rabin Pseudoprimality Test$9KW:K 610 $aPrefix Codes$9KW:K 610 $aPrimality Testing$9KW:K 610 $aPublic key cryptography$9KW:K 610 $aRSA Cryptosystem$9KW:K 610 $aReed-Solomon Codes$9KW:K 610 $aSecret key cryptography$9KW:K 610 $aShamir?s Secret Sharing Scheme$9KW:K 620 $aCH$dCham$3VANL001889 700 1$aSlinko$bArkadii$3VANV087802$0734115 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20240614$gRICA 856 4 $uhttp://doi.org/10.1007/978-3-030-44074-9$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$1IT-CE0120$2VAN08 912 $fN 912 $aVAN0248643 950 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$d08CONS e-book 4544 $e08eMF4544 20220726 996 $aAlgebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression$92440575 997 $aUNICAMPANIA