top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Algebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression / Arkadii Slinko
Algebra for applications : cryptography, secret sharing, error-correcting, fingerprinting, compression / Arkadii Slinko
Autore Slinko, Arkadii
Edizione [2. ed]
Pubbl/distr/stampa Cham, : Springer, 2020
Descrizione fisica xiv, 368 p. : ill. ; 24 cm
Soggetto topico 94A60 - Cryptography [MSC 2020]
68P30 - Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) [MSC 2020]
11T71 Algebraic coding theory; cryptography [MSC 2020]
14G50 - Applications to coding theory and cryptography of algebraic geometry [MSC 2020]
14H52 - Elliptic curves [MSC 2020]
11Y16 - Number-theoretic algorithms; complexity [MSC 2020]
11Y11 - Primality [MSC 2020]
11Y05 - Factorization [MSC 2020]
68P25 - Data encryption [MSC 2020]
11T06 - Polynomials over finite fields [MSC 2020]
11C08 - Polynomials in number theory [MSC 2020]
11A51 - Factorization; primality [MSC 2020]
11A05 - Multiplicative structure; Euclidean algorithm; greatest common divisors [MSC 2020]
94A62 - Authentication, digital signatures and secret sharing [MSC 2020]
12E20 - Finite fields (field-theoretic aspects) [MSC 2020]
20B30 - Symmetric groups [MSC 2020]
11C20 - Matrices, determinants in number theory [MSC 2020]
20A05 - Axiomatics and elementary properties of groups [MSC 2020]
Soggetto non controllato BCH Code
Diffie-Hellman
Digital signature
Elgamal Cryptosystem
Error-Correcting Codes
Euler Totient Function
Fingerprinting Codes
Fitingof Compression Code
Huffman compression code
Ideal secret sharing scheme
Lagrange Interpolation
Linear Secret Sharing Scheme
Miller-Rabin Pseudoprimality Test
Prefix Codes
Primality Testing
Public key cryptography
RSA Cryptosystem
Reed-Solomon Codes
Secret key cryptography
Shamir’s Secret Sharing Scheme
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNICAMPANIA-VAN0248643
Slinko, Arkadii  
Cham, : Springer, 2020
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Encrypt, Sign, Attack : A compact introduction to cryptography / Olaf Manz
Encrypt, Sign, Attack : A compact introduction to cryptography / Olaf Manz
Autore Manz, Olaf
Pubbl/distr/stampa Berlin, : Springer, 2022
Descrizione fisica x, 134 p. : ill. ; 24 cm
Soggetto topico 94A60 - Cryptography [MSC 2020]
94-XX - Information and communication theory, circuits [MSC 2020]
Soggetto non controllato Advanced Encryption Standard
Circuits
Cryptography
Diffie-Hellman key exchange
Digital signature
Encrypt
Information and communication
Public Key Ciphers
Secure Hash Algorithm
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNICAMPANIA-VAN0276066
Manz, Olaf  
Berlin, : Springer, 2022
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Evidence in civil law : Estonia / / Margus Poola
Evidence in civil law : Estonia / / Margus Poola
Autore Poola Margus
Pubbl/distr/stampa Institute for Local Self-Government and Public Procurement Maribor, 2015
Descrizione fisica 1 online resource (69 pages)
Collana Law & Society
Soggetto topico Law, General & Comparative
Law, Politics & Government
Soggetto non controllato civil procedure
gathering of evidence
international civil procedure
private international law
estonia
procedural costs
Communist Party of China
Defendant
Digital signature
Judiciary of Russia
Lawsuit
Letters rogatory
Plaintiff
Supreme court
ISBN 9789616842396 (ebook)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910131522903321
Poola Margus  
Institute for Local Self-Government and Public Procurement Maribor, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guideline for implementing cryptography in the federal government / / Elaine B. Barker, William C. Barker, Annabelle Lee
Guideline for implementing cryptography in the federal government / / Elaine B. Barker, William C. Barker, Annabelle Lee
Autore Barker Elaine B.
Edizione [Second edition.]
Pubbl/distr/stampa Gaithersburg, Md. : , : National Institute of Standards and Technology, , 2005
Descrizione fisica 1 online resource (viii, 89 pages)
Disciplina 005.8
Collana NIST special publication
Soggetto topico Computer security - Standards
Soggetto non controllato Cryptographic algorithm
Cryptographic hash function
Cryptographic key
Cryptographic module
Digital signature
Key establishment
Key management
Message authentication code
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910698257103321
Barker Elaine B.  
Gaithersburg, Md. : , : National Institute of Standards and Technology, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Some Fundamentals of Mathematics of Blockchain / Julien Riposo
Some Fundamentals of Mathematics of Blockchain / Julien Riposo
Autore Riposo, Julien
Pubbl/distr/stampa Cham, : Springer, 2023
Descrizione fisica xiii, 150 p. : ill. ; 24 cm
Soggetto non controllato Algebra
Blockchain
Digital signature
Mathematics
Network of Users
Probability
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNICAMPANIA-VAN0279614
Riposo, Julien  
Cham, : Springer, 2023
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui