MARC details
000 -LEADER |
fixed length control field |
03634cam a2200385 i 4500 |
001 - ACCESSION NUMBER |
control field |
25830 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170418105945.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
141022s2015 flua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2014039042 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781466570269 (hardback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
K36 2015 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8/2 |
Edition number |
23 |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
COM046000 |
-- |
COM083000 |
-- |
MAT036000 |
Source of number |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Katz, Jonathan, |
Dates associated with a name |
1974- |
245 10 - TITLE STATEMENT |
Title |
Introduction to modern cryptography / |
Statement of responsibility, etc |
Jonathan Katz, University of Maryland, College Park, MD, USA, Yehuda Lindell, Bar-llan University, Ramat Gan, Israel. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York, |
Name of publisher, distributor, etc |
CRC Press, |
Date of publication, distribution, etc |
c2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xx, 583 pages : |
Other physical details |
illustrations ; |
Dimensions |
25 cm. |
490 0# - SERIES STATEMENT |
Series statement |
Chapman & hall/crc cryptography and network security series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study. "-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Operating Systems / General. |
Source of heading or term |
bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Security / Cryptography. |
Source of heading or term |
bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
MATHEMATICS / Combinatorics. |
Source of heading or term |
bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Lindell, Yehuda. |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Cover image |
Uniform Resource Identifier |
<a href="http://images.tandf.co.uk/common/jackets/websmall/978146657/9781466570269.jpg">http://images.tandf.co.uk/common/jackets/websmall/978146657/9781466570269.jpg</a> |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |