"kryptering" . . "Teoría de la codificación." . . "Crittografia." . . "Computabilidade e modelos de computacao." . . "cryptographie théorie des codes [manuel]" . . "Mi ma Tong xin li lun Jiao cai." . . "密码 通信理论 教材." . "Transcodage." . . "Computabilidade e complexidade." . . "datasikkerhed" . . "Teoria da codificacao." . . "Cryptography." . . "kodesystemer" . . "Chiffrement (Informatique)" . . "Chiffrement (informatique)" . "Chiffrement (informatique)." . . . "RSA." . . "Protection des données." . . "Kryptologie." . . "Criptologia." . . "Public-Key-Kryptosystem." . . "Teoria de la codificació." . . "Codage." . . "Wiskundige controlesystemen." . . "théorie des codes manuel." . . "théorie des codes [manuel]" . "Kryptologie 0 Gesamtdarstellung." . . "authentification." . . "Kryptologie Lehrbuch." . . "Codificazione (Matematica) - Teoria." . . "Systèmes informatiques Mesures de sûreté." . . "sikkerhed" . . "Titkosírás számítógépvédelem." . . "codage donnee." . . "codage donnée." . . . . . . . . "Mi ma xue yuan li yu shi jian = Cryptography, theory and practice" . . . . . . . . "Cryptography: theory and practice" . . . . . . . "Cryptography theory and practice" . . . . . . "Cryptography : Theory and Practice" . . . . . "Cryptography : Theory and practice" . "密码学原理与实践 : 第二版= Cryptography theory and practice" . . "Cryptography Theory and Practice" . . "Mi ma xue yuan li yu shi jian" . "密码学原理与实践 = Cryptography Theory and Practice" . . . . . . . . . "Cryptography : theory and practice"@en . "Cryptography : theory and practice" . . . . "密码学原理与实践" . . . . . . . "Mi ma xue yuan li yu shi jian : di er ban= Cryptography theory and practice" . . "Matériel didactique" . . . . . "Mi ma xue yuan li yu shi jian = Cryptography Theory and Practice" . . . "\"The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: pseudorandom bit generation in cryptography; entity authentication, including schemes built from primitives and special purpose zero-knowledge schemes; key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs; public key infrastructure, including identity-based cryptography; secret sharing schemes; multicast security, including broadcast encryption and copyright protection.\"--Book cover." . . . . "Cryptography theory and practice" . . . . . . . . . "Cryptography, theory and practice" . . . "Cryptography theory and practice"@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Codificació, Teoria de la." . . "Cryptografie." . . "cryptografie." . "Criptografia." . . "Criptografía." . "cryptographie manuel." . . "cryptographie [manuel]" . "Información, Teoría de la." . . "Kódolás elmélete." . . "Coding theory." . . "génération nombre." . . "Codierungstheorie." . . "Cryptographie." . . "cryptographie." . "Protection de l'information (informatique)" . . "Cryptographie (Informatique)" . . "Geheimschrift." . . "kryptografi" . . "Théorie des codes." . . "securite informatique." . . "Sécurité informatique." .