LEADER 03302nam 2200553 450 001 996465806003316 005 20211205191550.0 010 $a3-540-39466-4 024 7 $a10.1007/3-540-39466-4 035 $a(CKB)1000000000210858 035 $a(SSID)ssj0000322396 035 $a(PQKBManifestationID)11268114 035 $a(PQKBTitleCode)TC0000322396 035 $a(PQKBWorkID)10286912 035 $a(PQKB)10743971 035 $a(DE-He213)978-3-540-39466-2 035 $a(MiAaPQ)EBC3072883 035 $a(MiAaPQ)EBC6574572 035 $a(Au-PeEL)EBL6574572 035 $a(OCoLC)1256262719 035 $a(PPN)155236822 035 $a(EXLCZ)991000000000210858 100 $a20211205d1983 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aCryptography $eproceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29-April 2, 1982 /$fedited by Thomas Beth 205 $a1st ed. 1983. 210 1$aBerlin ;$aHeidelberg ;$aNew York :$cSpringer-Verlag,$d1983. 215 $a1 online resource (VIII, 402 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v149 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-11993-0 320 $aIncludes bibliographical references. 327 $aClassical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices -- Cryptanalysis of a Kryha Machine -- Enigma Variations -- Mathematical Foundations -- Encrypting by Random Rotations -- Analogue Scrambling Schemes -- Analogue Speech Security Systems -- A Voice Scrambling System for Testing and Demonstration -- The Rating of Understanding in Secure Voice Communications Systems -- Analysis of Multiple Access Channel Using Multiple Level FSK -- Analog Scrambling by the General Fast Fourier Transform -- Stream Ciphers -- Stream Ciphers -- Multiplexed Sequences: Some Properties of the Minimum Polynomial -- On Using Prime Polynomials in Crypto Generators -- Cryptography in Large communication Systems -- Communication Security in Remote Controlled Computer Systems -- Privacy and Data Protection in Medicine -- The Data Encryption Standard -- Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding -- Are Big S-Boxes Best? -- The Average Cycle Size of The Key Stream in Output Feedback Encipherment -- Authentication Systems -- Authentication Procedures -- Fast Authentication in a Trapdoor-Knapsack Public Key Cryptosystem -- The Merkle ? Hellman ? Scheme -- A New Algorithm for the Solution of the Knapsack Problem -- Trapdoors in Knapsack Kryptosystems -- The Rivest - Shamir - Adleman - Scheme -- Is the RSA - Scheme safe? (Abstract) -- Ein Effizienzvergleich der Faktorisierungsverfahren von Morrison-Brillhart und Schroeppel (Extended Abstract) -- Finite Semigroups and The RSA-Cryptosystem -- How to Share a Secret. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v149 606 $aCryptography$vCongresses 615 0$aCryptography 676 $a001.5436 702 $aBeth$b Thomas$f1949- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465806003316 996 $aCryptography$9229794 997 $aUNISA LEADER 01150nas 2200421 c 450 001 9910894707603321 005 20221214154451.0 024 7 $aurn:nbn:de:0128-1-3529 035 $a(CKB)3790000000117170 035 $a(DE-599)ZDB2466113-2 035 $a(OCoLC)611790574 035 $a(OCoLC)785846505 035 $a(DE-101)991327683 035 $a(EXLCZ)993790000000117170 100 $a20081118b19231923 |y | 101 0 $ager 135 $aurg|||||a|a|a 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAdreßbuch der Stadt Coblenz und Umgebung 210 31$aSiegen$cMontanus-Verl.$d1923 215 $aOnline-Ressource 300 $aGesehen am 18.11.08 607 $aKoblenz$zRegion$2gnd 607 $aKoblenz$2gnd 608 $aZeitschrift$2gnd-content 608 $aVerzeichnis$2gnd-content 608 $aAdressbuch$2gnd-content 676 $a914.3 686 $a2$a130$2rpb 801 0$b0929 801 1$bDE-101 801 2$b4022 906 $aJOURNAL 912 $a9910894707603321 996 $aAdreßbuch der Stadt Coblenz und Umgebung$94242518 997 $aUNINA