skip to content
Public-Key Cryptography Preview this item
ClosePreview this item
Checking...

Public-Key Cryptography

Author: Arto Salomaa
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1990.
Series: EATCS monographs on theoretical computer science, 23.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Cryptography, secret writing, is probably as old as writing itself. But only recently has it become the object of extensive scientific studies. Vast new applications to data security are one explanation for this. Perhaps a more important reason for the huge growth of scientific research on cryptography is the seminal idea of public-key cryptography and the resulting new vistas on the possibilities of communication.  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Arto Salomaa
ISBN: 9783662026274 3662026279
OCLC Number: 851375344
Description: 1 online resource (x, 247 pages).
Contents: Outline of Contents: Classical Two-Way Cryptography --
The Idea of Public Keys --
Knapsack Systems --
RSA --
Other Bases of Cryptosystems --
Cryptographic Protocols: Surprising Vistas for Communication --
Appendix A. Tutorial in Complexity Theory --
Appendix B. Tutorial in Number Theory --
Problems --
Historical and Bibliographical Remarks --
References --
Index.
Series Title: EATCS monographs on theoretical computer science, 23.
Responsibility: by Arto Salomaa.

Abstract:

Cryptography, secret writing, is probably as old as writing itself. But only recently has it become the object of extensive scientific studies. Vast new applications to data security are one explanation for this. Perhaps a more important reason for the huge growth of scientific research on cryptography is the seminal idea of public-key cryptography and the resulting new vistas on the possibilities of communication. This book gives a broad overview of public-key cryptography, covering its essence and advantages, various public-key cryptosystems and protocols. It also gives a comprehensive introduction to classical cryptography and cryptanalysis. The book is self-contained and suitable both as a text and as a reference. It starts from the beginning but also includes some 1989 developments. The presentation is in many ways new, with some new results. The treatment is rigorous but avoids unnecessary formalism. The plaintext examples in the book form a package of basic sauna knowledge.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/851375344> # Public-Key Cryptography
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "851375344" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/19810125#Place/berlin_heidelberg> ; # Berlin, Heidelberg
    schema:about <http://experiment.worldcat.org/entity/work/data/19810125#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
    schema:about <http://experiment.worldcat.org/entity/work/data/19810125#Topic/engineering_&_applied_sciences> ; # Engineering & Applied Sciences
    schema:about <http://id.worldcat.org/fast/866237> ; # Coding theory
    schema:about <http://experiment.worldcat.org/entity/work/data/19810125#Topic/computer_science> ; # Computer Science
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:about <http://id.worldcat.org/fast/868961> ; # Combinatorial analysis
    schema:about <http://id.worldcat.org/fast/1145830> ; # Telecommunication
    schema:bookFormat schema:EBook ;
    schema:creator <http://viaf.org/viaf/108122679> ; # Arto Salomaa
    schema:datePublished "1990" ;
    schema:description "Outline of Contents: Classical Two-Way Cryptography -- The Idea of Public Keys -- Knapsack Systems -- RSA -- Other Bases of Cryptosystems -- Cryptographic Protocols: Surprising Vistas for Communication -- Appendix A. Tutorial in Complexity Theory -- Appendix B. Tutorial in Number Theory -- Problems -- Historical and Bibliographical Remarks -- References -- Index."@en ;
    schema:description "Cryptography, secret writing, is probably as old as writing itself. But only recently has it become the object of extensive scientific studies. Vast new applications to data security are one explanation for this. Perhaps a more important reason for the huge growth of scientific research on cryptography is the seminal idea of public-key cryptography and the resulting new vistas on the possibilities of communication. This book gives a broad overview of public-key cryptography, covering its essence and advantages, various public-key cryptosystems and protocols. It also gives a comprehensive introduction to classical cryptography and cryptanalysis. The book is self-contained and suitable both as a text and as a reference. It starts from the beginning but also includes some 1989 developments. The presentation is in many ways new, with some new results. The treatment is rigorous but avoids unnecessary formalism. The plaintext examples in the book form a package of basic sauna knowledge."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/19810125> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/1431-2654> ; # EATCS Monographs on Theoretical Computer Science,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/19810125#Series/eatcs_monographs_on_theoretical_computer_science> ; # EATCS monographs on theoretical computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/19810125#CreativeWork/> ;
    schema:name "Public-Key Cryptography"@en ;
    schema:productID "851375344" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/851375344#PublicationEvent/berlin_heidelberg_springer_berlin_heidelberg_1990> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/19810125#Agent/springer_berlin_heidelberg> ; # Springer Berlin Heidelberg
    schema:url <http://dx.doi.org/10.1007/978-3-662-02627-4> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3098546> ;
    schema:workExample <http://worldcat.org/isbn/9783662026274> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-662-02627-4> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/851375344> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/19810125#Agent/springer_berlin_heidelberg> # Springer Berlin Heidelberg
    a bgn:Agent ;
    schema:name "Springer Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/19810125#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
    schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/19810125#Series/eatcs_monographs_on_theoretical_computer_science> # EATCS monographs on theoretical computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/851375344> ; # Public-Key Cryptography
    schema:name "EATCS monographs on theoretical computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/19810125#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/19810125#Topic/computer_science> # Computer Science
    a schema:Intangible ;
    schema:name "Computer Science"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/19810125#Topic/engineering_&_applied_sciences> # Engineering & Applied Sciences
    a schema:Intangible ;
    schema:name "Engineering & Applied Sciences"@en ;
    .

<http://id.worldcat.org/fast/1145830> # Telecommunication
    a schema:Intangible ;
    schema:name "Telecommunication"@en ;
    .

<http://id.worldcat.org/fast/866237> # Coding theory
    a schema:Intangible ;
    schema:name "Coding theory"@en ;
    .

<http://id.worldcat.org/fast/868961> # Combinatorial analysis
    a schema:Intangible ;
    schema:name "Combinatorial analysis"@en ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/108122679> # Arto Salomaa
    a schema:Person ;
    schema:familyName "Salomaa" ;
    schema:givenName "Arto" ;
    schema:name "Arto Salomaa" ;
    .

<http://worldcat.org/isbn/9783662026274>
    a schema:ProductModel ;
    schema:isbn "3662026279" ;
    schema:isbn "9783662026274" ;
    .

<http://worldcat.org/issn/1431-2654> # EATCS Monographs on Theoretical Computer Science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/851375344> ; # Public-Key Cryptography
    schema:issn "1431-2654" ;
    schema:name "EATCS Monographs on Theoretical Computer Science," ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.