000 03800nam a22006735i 4500
001 978-3-319-76620-1
003 DE-He213
005 20210201191453.0
007 cr nn 008mamaa
008 180227s2018 gw | s |||| 0|eng d
020 _a9783319766201
_9978-3-319-76620-1
050 4 _aQA76.9.D335
072 7 _aGPJ
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.82
_223
245 1 0 _aNumber-Theoretic Methods in Cryptology
_h[electronic resource] :
_bFirst International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers /
_cedited by Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXX, 279 p. 23 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology ;
_v10737
500 _aAcceso multiusuario
505 0 _aElliptic curves in cryptography -- Public-key cryptography -- Lattices in cryptography -- Number theory -- Pseudorandomness -- Algebraic structures and analysis.
520 _aThis book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017. The 15 revised full papers presented in this book together with 3 invited talks were carefully reviewed and selected from 32 initial submissions. The papers are organized in topical sections on elliptic curves in cryptography; public-key cryptography; lattices in cryptography; number theory; pseudorandomness; and algebraic structures and analysis.
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aData encryption (Computer science).
650 0 _aComputer science-Mathematics.
650 0 _aAlgorithms.
650 0 _aNumber theory.
650 0 _aSoftware engineering.
650 0 _aComputers.
650 1 4 _aCryptology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28020
650 2 4 _aDiscrete Mathematics in Computer Science.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I17028
650 2 4 _aAlgorithms.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M14018
650 2 4 _aNumber Theory.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M25001
650 2 4 _aSoftware Engineering/Programming and Operating Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I14002
650 2 4 _aComputing Milieux.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24008
700 1 _aKaczorowski, Jerzy.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPieprzyk, Josef.
_eeditor.
_0(orcid)0000-0002-1917-6466
_1https://orcid.org/0000-0002-1917-6466
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPomykała, Jacek.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319766195
776 0 8 _iPrinted edition:
_z9783319766218
830 0 _aSecurity and Cryptology ;
_v10737
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-76620-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cLIBRO_ELEC
999 _c243852
_d243851