Introduction to cryptography
DOI10.1007/978-3-642-39775-2zbMATH Open1336.94002OpenAlexW4254658747MaRDI QIDQ5890656FDOQ5890656
Authors: Johannes Buchmann
Publication date: 20 May 2016
Published in: Springer-Lehrbuch (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-39775-2
Recommendations
identificationdiscrete logarithminteger factorizationprimality testssecret sharingdigital signatureauthentication codeszero-knowledge proofselementary number theorypublic key cryptosystemscryptographic hash functionsRijndael cipherprime number generationsymmetric cryptosystemsShannon's theorychallenge-response-identificationDES-algorithmfinite fields and elliptic curvesAES-algorithmLamport-Diffie-one-time signature schemeMerkle's signature schemesecure block cipher
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Mathematics for nonmathematicians (engineering, social sciences, etc.) (00A06) Factorization (11Y05) Applications to coding theory and cryptography of arithmetic geometry (14G50) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62) Primality (11Y11)
Cited In (9)
This page was built for publication: Introduction to cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5890656)