|
|
|
|
LEADER |
02713nam a22005775i 4500 |
001 |
10856 |
003 |
DE-He213 |
005 |
20130725200629.0 |
007 |
cr nn 008mamaa |
008 |
100626s2010 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642137976
|9 978-3-642-13797-6
|
024 |
7 |
# |
|a 10.1007/978-3-642-13797-6
|2 doi
|
050 |
# |
4 |
|a QA76.9.M35
|
072 |
# |
7 |
|a UYAM
|2 bicssc
|
072 |
# |
7 |
|a COM018000
|2 bisacsh
|
072 |
# |
7 |
|a MAT002000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.131
|2 23
|
100 |
1 |
# |
|a Hasan, M. Anwar.
|e editor.
|
245 |
1 |
0 |
|a Arithmetic of Finite Fields
|b Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
|c edited by M. Anwar Hasan, Tor Helleseth.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2010.
|
300 |
# |
# |
|a 280p. 41 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 6087
|x 0302-9743 ;
|
520 |
# |
# |
|a This book constitutes the refereed proceedings of the Third International Workshop on the Arithmetic of Finite Fields, WAIFI 2010, held in Istanbul, Turkey, in June 2010. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers are organized in topical sections on efficient finite field arithmetic, pseudo-random numbers and sequences, Boolean functions, functions, Equations and modular multiplication, finite field arithmetic for pairing based cryptography, and finite field, cryptography and coding.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data structures (Computer science).
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Computer software.
|
650 |
# |
0 |
|a Computational complexity.
|
650 |
# |
0 |
|a Algebra
|x Data processing.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Symbolic and Algebraic Manipulation.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
700 |
1 |
# |
|a Helleseth, Tor.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642137969
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 6087
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-13797-6
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|