LEADER 03587nam 22008415 450 001 996465560803316 005 20230329165004.0 010 $a3-642-42001-X 024 7 $a10.1007/978-3-642-42001-6 035 $a(CKB)3710000000031300 035 $a(DE-He213)978-3-642-42001-6 035 $a(SSID)ssj0001067749 035 $a(PQKBManifestationID)11944728 035 $a(PQKBTitleCode)TC0001067749 035 $a(PQKBWorkID)11091825 035 $a(PQKB)10965750 035 $a(MiAaPQ)EBC3093175 035 $a(PPN)176117261 035 $a(EXLCZ)993710000000031300 100 $a20131121d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNumber Theory and Cryptography$b[electronic resource] $ePapers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday /$fedited by Marc Fischlin, Stefan Katzenbeisser 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 281 p. 69 illus.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v8260 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-42000-1 327 $aPersonal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security. 330 $aThis festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students, and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v8260 606 $aAlgorithms 606 $aApplication software 606 $aComputer science?Mathematics 606 $aDiscrete mathematics 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing?Management 606 $aAlgorithms 606 $aComputer and Information Systems Applications 606 $aDiscrete Mathematics in Computer Science 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 615 0$aAlgorithms. 615 0$aApplication software. 615 0$aComputer science?Mathematics. 615 0$aDiscrete mathematics. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing?Management. 615 14$aAlgorithms. 615 24$aComputer and Information Systems Applications. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 676 $a512.7 702 $aFischlin$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatzenbeisser$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465560803316 996 $aNumber Theory and Cryptography$9381403 997 $aUNISA