000 | 03890nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-540-49677-9 | ||
003 | DE-He213 | ||
005 | 20240423132524.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1998 gw | s |||| 0|eng d | ||
020 |
_a9783540496779 _9978-3-540-49677-9 |
||
024 | 7 |
_a10.1007/3-540-49677-7 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology 1981 - 1997 _h[electronic resource] : _bElectronic Proceedings and Index of the CRYPTO and EUROCRYPT Conference, 1981 - 1997 / _cedited by Kevin S. McCurley, Claus D. Ziegler. |
250 | _a1st ed. 1998. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c1998. |
|
300 |
_aXIX, 464 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1440 |
|
505 | 0 | _aConference Contents -- CRYPTO ’81 -- EUROCRYPT ’82 -- CRYPTO ’82 -- EUROCRYPT ’83 -- CRYPTO ’83 -- EUROCRYPT ’84 -- CRYPTO ’84 -- EUROCRYPT ’85 -- CRYPTO ’85 -- EUROCRYPT ’86 -- CRYPTO ’86 -- EUROCRYPT ’87 -- CRYPTO ’87 -- EUROCRYPT ’88 -- CRYPTO ’88 -- EUROCRYPT ’89 -- CRYPTO ’89 -- EUROCRYPT ’90 -- CRYPTO ’90 -- EUROCRYPT ’91 -- CRYPTO ’91 -- EUROCRYPT ’92 -- CRYPTO ’92 -- EUROCRYPT ’93 -- CRYPTO ’93 -- EUROCRYPT ’94 -- CRYPTO ’94 -- EUROCRYPT ’95 -- CRYPTO ’95 -- EUROCRYPT ’96 -- CRYPTO ’96 -- EUROCRYPT ’97 -- CRYPTO ’97. | |
520 | _aAboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community. | ||
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aCryptology. |
700 | 1 |
_aMcCurley, Kevin S. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aZiegler, Claus D. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540650690 |
776 | 0 | 8 |
_iPrinted edition: _z9783662168011 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1440 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/3-540-49677-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c188688 _d188688 |