000 05122nam a22005415i 4500
001 978-3-319-31515-7
003 DE-He213
005 20220801220344.0
007 cr nn 008mamaa
008 160418s2016 sz | s |||| 0|eng d
020 _a9783319315157
_9978-3-319-31515-7
024 7 _a10.1007/978-3-319-31515-7
_2doi
050 4 _aQA76.9.M35
072 7 _aUYA
_2bicssc
072 7 _aMAT003000
_2bisacsh
072 7 _aUYA
_2thema
082 0 4 _a004.0151
_223
100 1 _aAhlswede, Rudolf.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_949835
245 1 0 _aHiding Data - Selected Topics
_h[electronic resource] :
_bRudolf Ahlswede’s Lectures on Information Theory 3 /
_cby Rudolf Ahlswede ; edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe, Ulrich Tamm.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXIV, 356 p. 17 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aFoundations in Signal Processing, Communications and Networking,
_x1863-8546 ;
_v12
505 0 _aChapter I A Short Course on Cryptography -- Chapter II Authentication and Secret-Key Cryptology -- Chapter III The Mathematical Background of the Advanced Encryption Standard -- Chapter IV Elliptic Curve Cryptosystems -- Chapter V Founding Cryptography on Oblivious Transfer -- Supplement.
520 _aDevoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede’s lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rüdiger Reischuk contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.
650 0 _aComputer science—Mathematics.
_931682
650 1 4 _aMathematical Applications in Computer Science.
_931683
700 1 _aAhlswede, Alexander.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949836
700 1 _aAlthöfer, Ingo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949837
700 1 _aDeppe, Christian.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949838
700 1 _aTamm, Ulrich.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949839
710 2 _aSpringerLink (Online service)
_949840
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319315133
776 0 8 _iPrinted edition:
_z9783319315140
776 0 8 _iPrinted edition:
_z9783319810553
830 0 _aFoundations in Signal Processing, Communications and Networking,
_x1863-8546 ;
_v12
_949841
856 4 0 _uhttps://doi.org/10.1007/978-3-319-31515-7
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78479
_d78479