Welcome to UE Central Library

Keep Smiling

Cryptography : (Record no. 12018)

MARC details
000 -LEADER
fixed length control field 03590cam a22002294a 4500
001 - CONTROL NUMBER
control field 14264880
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200901100455.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 060214s2006 flua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1584885084 (hardcover : acidfree paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781584885085
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 22
Item number S8597
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stinson, Douglas R.
245 10 - TITLE STATEMENT
Title Cryptography :
Remainder of title theory and practice
Statement of responsibility, etc / Douglas R. Stinson.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton :
Name of publisher, distributor, etc Chapman & Hall/CRC,
Date of publication, distribution, etc 2006
300 ## - PHYSICAL DESCRIPTION
Extent 593 p. :
Other physical details ill. ;
Dimensions 25 cm.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note CLASSICAL CRYPTOGRAPHYIntroduction: Some Simple CryptosystemsCryptanalysisNotesExercisesSHANNON'S THEORYIntroductionElementary Probability TheoryPerfect SecrecyEntropyProperties of EntropySpurious Keys and Unicity DistanceProduct CryptosystemsNotesExercisesBLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARDIntroductionSubstitution-Permutation NetworksLinear CryptanalysisDifferential CryptanalysisThe Data Encryption StandardThe Advanced Encryption StandardModes of OperationNotes and ReferencesExercisesCRYPTOGRAPHIC HASH FUNCTIONSHash Functions and Data IntegritySecurity of Hash FunctionsIterated Hash FunctionsMessage Authentication CodesUnconditionally Secure MACsNotes and ReferencesExercisesTHE RSA CRYPTOSYSTEM AND FACTORING INTEGERSIntroduction to Public-key CryptographyMore Number TheoryThe RSA CryptosystemPrimality TestingSquare Roots Modulo nFactoring AlgorithmsOther Attacks on RSAThe Rabin CryptosystemSemantic Security of RSANotes and ReferencesExercisesPUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMSThe ElGamal CryptosystemAlgorithms for the Discrete Logarithm ProblemLower Bounds on the Complexity of Generic AlgorithmsFinite FieldsElliptic CurvesDiscrete Logarithm Algorithms in PracticeSecurity of ElGamal SystemsNotes and ReferencesExercisesSIGNATURE SCHEMESIntroductionSecurity Requirements for Signature SchemesThe ElGamal Signature SchemeVariants of the ElGamal Signature SchemeProvably Secure Signature SchemesUndeniable SignaturesFail-stop SignaturesNotes and ReferencesExercisesPSEUDO-RANDOM NUMBER GENERATIONIntroduction and ExamplesIndistinguishability of Probability DistributionsThe Blum-Blum-Shub GeneratorProbabilistic EncryptionNotes and ReferencesExercisesIDENTIFICATION SCHEMES AND ENTITY AUTHENTICATIONIntroductionChallenge-and-Response in the Secret-Key SettingChallenge-and-Response in the Public-Key SettingThe Schnorr Identification SchemeThe Okamoto Identification SchemeThe Guillou-Quisquater Identification SchemeNotes and ReferencesExercisesKEY DISTRIBUTIONIntroductionDiffie-Hellman Key PredistributionUnconditionally Secure Key PredistributionKey Distribution PatternsSession Key Distribution SchemesNotes and ReferencesExercisesKEY AGREEMENT SCHEMESIntroductionDiffie-Hellman Key AgreementMTI Key Agreement SchemesKey Agreement Using Self-Certifying KeysEncrypted Key ExchangeConference Key Agreement SchemesNotes and ReferencesExercisesPUBLIC-KEY INFRASTRUCTUREIntroduction: What is a PKI?CertificatesTrust ModelsThe Future of PKI?Identity-Based CryptographyNotes and ReferencesExercisesSECRET SHARING SCHEMESIntroduction: The Shamir Threshold SchemeAccess Structures and General Secret SharingInformation Rate and Construction of Efficient SchemesNotes and ReferencesExercisesMULTICAST SECURITY AND COPYRIGHT PROTECTIONIntroduction to Multicast SecurityBroadcast EncryptionMulticast Re-KeyingCopyright ProtectionTracing Illegally Redistributed KeysNotes and ReferencesExercisesFURTHER READINGBIBLIOGRAPHYINDEX
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 09.11.2018 U.E.24585 005.82 S8597 T9619 24.10.2023 09.11.2018 Books
      UE-Central Library UE-Central Library 09.11.2018 U.E.24585 005.82 S8597 T9620 09.11.2018 09.11.2018 Books
      UE-Central Library UE-Central Library 13.11.2018 U.E.24585 005.82 S8597 T9621 13.11.2018 13.11.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk