語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hiding data - selected topics = Rudo...
~
Ahlswede, Rudolf.
FindBook
Google Book
Amazon
博客來
Hiding data - selected topics = Rudolf Ahlswede's lectures on information theory 3 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hiding data - selected topics/ by Rudolf Ahlswede ; edited by Alexander Ahlswede ... [et al.].
其他題名:
Rudolf Ahlswede's lectures on information theory 3 /
作者:
Ahlswede, Rudolf.
其他作者:
Ahlswede, Alexander.
出版者:
Cham :Springer International Publishing : : 2016.,
面頁冊數:
xiv, 356 p. :ill., digital ;24 cm.
內容註:
Chapter I A Short Course on Cryptography -- Chapter II Authentication and Secret-Key Cryptology -- Chapter III The Mathematical Background of the Advanced Encryption Standard -- Chapter IV Elliptic Curve Cryptosystems -- Chapter V Founding Cryptography on Oblivious Transfer -- Supplement.
Contained By:
Springer eBooks
標題:
Information theory. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-31515-7
ISBN:
9783319315157
Hiding data - selected topics = Rudolf Ahlswede's lectures on information theory 3 /
Ahlswede, Rudolf.
Hiding data - selected topics
Rudolf Ahlswede's lectures on information theory 3 /[electronic resource] :by Rudolf Ahlswede ; edited by Alexander Ahlswede ... [et al.]. - Cham :Springer International Publishing :2016. - xiv, 356 p. :ill., digital ;24 cm. - Foundations in signal processing, communications and networking,v.121863-8538 ;. - Foundations in signal processing, communications and networking ;7..
Chapter I A Short Course on Cryptography -- Chapter II Authentication and Secret-Key Cryptology -- Chapter III The Mathematical Background of the Advanced Encryption Standard -- Chapter IV Elliptic Curve Cryptosystems -- Chapter V Founding Cryptography on Oblivious Transfer -- Supplement.
Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon's historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of "oblivious transfer" is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rudiger Reischuk contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.
ISBN: 9783319315157
Standard No.: 10.1007/978-3-319-31515-7doiSubjects--Topical Terms:
542527
Information theory.
LC Class. No.: Q360
Dewey Class. No.: 003.54
Hiding data - selected topics = Rudolf Ahlswede's lectures on information theory 3 /
LDR
:03854nmm a2200325 a 4500
001
2035873
003
DE-He213
005
20161013092414.0
006
m d
007
cr nn 008maaau
008
161117s2016 gw s 0 eng d
020
$a
9783319315157
$q
(electronic bk.)
020
$a
9783319315133
$q
(paper)
024
7
$a
10.1007/978-3-319-31515-7
$2
doi
035
$a
978-3-319-31515-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q360
072
7
$a
PBW
$2
bicssc
072
7
$a
MAT003000
$2
bisacsh
082
0 4
$a
003.54
$2
23
090
$a
Q360
$b
.A285 2016
100
1
$a
Ahlswede, Rudolf.
$3
2068362
245
1 0
$a
Hiding data - selected topics
$h
[electronic resource] :
$b
Rudolf Ahlswede's lectures on information theory 3 /
$c
by Rudolf Ahlswede ; edited by Alexander Ahlswede ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xiv, 356 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Foundations in signal processing, communications and networking,
$x
1863-8538 ;
$v
v.12
505
0
$a
Chapter I A Short Course on Cryptography -- Chapter II Authentication and Secret-Key Cryptology -- Chapter III The Mathematical Background of the Advanced Encryption Standard -- Chapter IV Elliptic Curve Cryptosystems -- Chapter V Founding Cryptography on Oblivious Transfer -- Supplement.
520
$a
Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon's historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of "oblivious transfer" is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rudiger Reischuk contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.
650
0
$a
Information theory.
$3
542527
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Mathematics.
$3
515831
650
2 4
$a
Information and Communication, Circuits.
$3
893882
700
1
$a
Ahlswede, Alexander.
$3
2068363
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Foundations in signal processing, communications and networking ;
$v
7.
$3
1566528
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-31515-7
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9279717
電子資源
11.線上閱覽_V
電子書
EB Q360
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入