MARC details
000 -LIDER |
fixed length control field |
04975nam a22005655i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-662-49301-4 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180206183051.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160330s2016 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783662493014 |
-- |
978-3-662-49301-4 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URY |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Edition number |
23 |
245 14 - TITLE STATEMENT |
Title |
The New Codebreakers |
Medium |
[recurso electrónico] : |
Remainder of title |
Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / |
Statement of responsibility, etc. |
edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater. |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg : |
-- |
Imprint: Springer, |
-- |
2016. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIV, 551 p. 135 illus. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume/sequential designation |
9100 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
History -- Mary of Guise?s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn?s 80th birthday. The title of this books leans on the title of a serious history of cryptology named ?The Codebreakers?, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology ? past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Algorithms. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Management information systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Management of Computing and Information Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Algorithm Analysis and Problem Complexity. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Information Systems Applications (incl. Internet). |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Ryan, Peter Y. A. |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Naccache, David. |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Quisquater, Jean-Jacques. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783662493007 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Lecture Notes in Computer Science, |
-- |
0302-9743 ; |
Volume number/sequential designation |
9100 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Public note |
Libro electrónico |
Uniform Resource Identifier |
http://148.231.10.114:2048/login?url=http://dx.doi.org/10.1007/978-3-662-49301-4 |
912 ## - |
-- |
ZDB-2-SCS |
912 ## - |
-- |
ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Libro Electrónico |