Cryptography : (Record no. 12018)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03590cam a22002294a 4500 |
001 - CONTROL NUMBER | |
control field | 14264880 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200901100455.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 060214s2006 flua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1584885084 (hardcover : acidfree paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781584885085 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 |
Edition number | 22 |
Item number | S8597 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stinson, Douglas R. |
245 10 - TITLE STATEMENT | |
Title | Cryptography : |
Remainder of title | theory and practice |
Statement of responsibility, etc | / Douglas R. Stinson. |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boca Raton : |
Name of publisher, distributor, etc | Chapman & Hall/CRC, |
Date of publication, distribution, etc | 2006 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 593 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Coding theory. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | CLASSICAL CRYPTOGRAPHYIntroduction: Some Simple CryptosystemsCryptanalysisNotesExercisesSHANNON'S THEORYIntroductionElementary Probability TheoryPerfect SecrecyEntropyProperties of EntropySpurious Keys and Unicity DistanceProduct CryptosystemsNotesExercisesBLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARDIntroductionSubstitution-Permutation NetworksLinear CryptanalysisDifferential CryptanalysisThe Data Encryption StandardThe Advanced Encryption StandardModes of OperationNotes and ReferencesExercisesCRYPTOGRAPHIC HASH FUNCTIONSHash Functions and Data IntegritySecurity of Hash FunctionsIterated Hash FunctionsMessage Authentication CodesUnconditionally Secure MACsNotes and ReferencesExercisesTHE RSA CRYPTOSYSTEM AND FACTORING INTEGERSIntroduction to Public-key CryptographyMore Number TheoryThe RSA CryptosystemPrimality TestingSquare Roots Modulo nFactoring AlgorithmsOther Attacks on RSAThe Rabin CryptosystemSemantic Security of RSANotes and ReferencesExercisesPUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMSThe ElGamal CryptosystemAlgorithms for the Discrete Logarithm ProblemLower Bounds on the Complexity of Generic AlgorithmsFinite FieldsElliptic CurvesDiscrete Logarithm Algorithms in PracticeSecurity of ElGamal SystemsNotes and ReferencesExercisesSIGNATURE SCHEMESIntroductionSecurity Requirements for Signature SchemesThe ElGamal Signature SchemeVariants of the ElGamal Signature SchemeProvably Secure Signature SchemesUndeniable SignaturesFail-stop SignaturesNotes and ReferencesExercisesPSEUDO-RANDOM NUMBER GENERATIONIntroduction and ExamplesIndistinguishability of Probability DistributionsThe Blum-Blum-Shub GeneratorProbabilistic EncryptionNotes and ReferencesExercisesIDENTIFICATION SCHEMES AND ENTITY AUTHENTICATIONIntroductionChallenge-and-Response in the Secret-Key SettingChallenge-and-Response in the Public-Key SettingThe Schnorr Identification SchemeThe Okamoto Identification SchemeThe Guillou-Quisquater Identification SchemeNotes and ReferencesExercisesKEY DISTRIBUTIONIntroductionDiffie-Hellman Key PredistributionUnconditionally Secure Key PredistributionKey Distribution PatternsSession Key Distribution SchemesNotes and ReferencesExercisesKEY AGREEMENT SCHEMESIntroductionDiffie-Hellman Key AgreementMTI Key Agreement SchemesKey Agreement Using Self-Certifying KeysEncrypted Key ExchangeConference Key Agreement SchemesNotes and ReferencesExercisesPUBLIC-KEY INFRASTRUCTUREIntroduction: What is a PKI?CertificatesTrust ModelsThe Future of PKI?Identity-Based CryptographyNotes and ReferencesExercisesSECRET SHARING SCHEMESIntroduction: The Shamir Threshold SchemeAccess Structures and General Secret SharingInformation Rate and Construction of Efficient SchemesNotes and ReferencesExercisesMULTICAST SECURITY AND COPYRIGHT PROTECTIONIntroduction to Multicast SecurityBroadcast EncryptionMulticast Re-KeyingCopyright ProtectionTracing Illegally Redistributed KeysNotes and ReferencesExercisesFURTHER READINGBIBLIOGRAPHYINDEX |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 09.11.2018 | U.E.24585 | 005.82 S8597 | T9619 | 24.10.2023 | 09.11.2018 | Books | |||
UE-Central Library | UE-Central Library | 09.11.2018 | U.E.24585 | 005.82 S8597 | T9620 | 09.11.2018 | 09.11.2018 | Books | |||
UE-Central Library | UE-Central Library | 13.11.2018 | U.E.24585 | 005.82 S8597 | T9621 | 13.11.2018 | 13.11.2018 | Books |