000 | 05122nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-319-31515-7 | ||
003 | DE-He213 | ||
005 | 20220801220344.0 | ||
007 | cr nn 008mamaa | ||
008 | 160418s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319315157 _9978-3-319-31515-7 |
||
024 | 7 |
_a10.1007/978-3-319-31515-7 _2doi |
|
050 | 4 | _aQA76.9.M35 | |
072 | 7 |
_aUYA _2bicssc |
|
072 | 7 |
_aMAT003000 _2bisacsh |
|
072 | 7 |
_aUYA _2thema |
|
082 | 0 | 4 |
_a004.0151 _223 |
100 | 1 |
_aAhlswede, Rudolf. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _949835 |
|
245 | 1 | 0 |
_aHiding Data - Selected Topics _h[electronic resource] : _bRudolf Ahlswede’s Lectures on Information Theory 3 / _cby Rudolf Ahlswede ; edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe, Ulrich Tamm. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXIV, 356 p. 17 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aFoundations in Signal Processing, Communications and Networking, _x1863-8546 ; _v12 |
|
505 | 0 | _aChapter I A Short Course on Cryptography -- Chapter II Authentication and Secret-Key Cryptology -- Chapter III The Mathematical Background of the Advanced Encryption Standard -- Chapter IV Elliptic Curve Cryptosystems -- Chapter V Founding Cryptography on Oblivious Transfer -- Supplement. | |
520 | _aDevoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede’s lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rüdiger Reischuk contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs. | ||
650 | 0 |
_aComputer science—Mathematics. _931682 |
|
650 | 1 | 4 |
_aMathematical Applications in Computer Science. _931683 |
700 | 1 |
_aAhlswede, Alexander. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949836 |
|
700 | 1 |
_aAlthöfer, Ingo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949837 |
|
700 | 1 |
_aDeppe, Christian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949838 |
|
700 | 1 |
_aTamm, Ulrich. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949839 |
|
710 | 2 |
_aSpringerLink (Online service) _949840 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319315133 |
776 | 0 | 8 |
_iPrinted edition: _z9783319315140 |
776 | 0 | 8 |
_iPrinted edition: _z9783319810553 |
830 | 0 |
_aFoundations in Signal Processing, Communications and Networking, _x1863-8546 ; _v12 _949841 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-31515-7 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78479 _d78479 |