Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Cryptography: Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982
Foyalty 191

Cryptography: Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback)

Printed to order. Despatched in 2-3 weeks.
Email me when back in stock


T. Beth (Ed.): Cryptography - EUROCRYPT '82, LNCS 149, pp. 1-28, 1983. 0 Springer-Verlag Berlin Heidelberg 1983 3 Having all of a sudden left the shady corner of semi-military art, modern cryptography has become a central topic of research in all areas of communication science. Definitions (cf. Bauer pp. 31 - 48) Cryptographic measures are applied to p- tect valuable data during transmission against unwanted interception INTERCEPTOR Fig. A: passive violation and (possibly undectable) forgery . Fig. 2: acti-se violation In accordance with the subsequent paper of Bauer (pp. 31 - 481, the technique applied to meet these requirements is called en- tion. In this process the transmitter enciphers (or encrypts) a plaintext message into a ciphertext. 4 ciphertexc ciphering Fig. 3: The Wire-tap-channel This transformation is called a cipher(function) which the au- rized receiver deciphers (decrypts). An enemy is a person or institution who wants illegal access to the messages. Assuming that the enemy can only get hold of the ciph- texts, he has to perform a cryptanalysis in order to reconstitute the plaintexts.

To add to the difficulties for a cryptanalyst, the cipher functions are chosen to a varying parameter, called the key. A generator cryptosystem consists of a class of injective cipher functions ES:M-C , mapping plaintext messages(EM) into ciphertexts(EC) . The parameter s runs through the set K of keys. These formulations are best demonstrated by the basic, classical examples.

Reference & ResearchLibrary & information sciencesInformation theoryReference & ResearchResearch & information: generalCoding theory & cryptology Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Publication Date: 01/02/1983 ISBN-13: 9783540119937  Details: Type: Paperback Format: Books
Availability: Printed to order. Despatched in 2-3 weeks.  

More books by T. Beth

Leave Review


Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Standard Delivery FREE FREE 3-5 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

Control Engineering
Laszlo Keviczky; Ruth Bars; Jeno...
Control Engineering: MATLAB Exercises
Laszlo Keviczky; Ruth Bars; Jeno...
Automatic Control with Experiments
Victor Manuel Hernandez-Guzman; Ramon...
Systems, Self-Organisation and...
Pereira Junior Alfredo; William A...
© W&G Foyle Ltd
Foyles uses cookies to help ensure your experience on our site is the best possible. Click here if you’d like to find out more about the types of cookies we use.
Accept and Close