Introduction to modern cryptography / (Record no. 1964)

MARC details
000 -LEADER
fixed length control field 03357cam a22003135i 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-CaNGU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240131124036.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231121s2021 flua frb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780815354369
Qualifying information (hardcover)
040 ## - CATALOGING SOURCE
Original cataloging agency THM
Language of cataloging eng
Description conventions rda
Transcribing agency THM
Modifying agency OCLCO
-- CUV
-- EG-CaNGU
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number KAI
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Katz, Jonathan,
Dates associated with a name 1974-,
Relator term author.
9 (RLIN) 5914
245 10 - TITLE STATEMENT
Title Introduction to modern cryptography /
250 ## - EDITION STATEMENT
Edition statement Third edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, Florida :
Name of producer, publisher, distributor, manufacturer Chapman & Hall Book /
-- CRC Press, Taylor & Francis Group,
Date of production, publication, distribution, manufacture, or copyright notice 2021.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 626 :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Chapman & Hall / CRC cryptography and network security
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note I. Introduction and classical cryptography -- Introduction -- Perfectly secret encryption -- II. Private-key (symmetric) cryptography -- Private-key encryption -- Message authentication codes -- CCA-security and authenticated encryption -- Hash functions and applications -- Practical constructions of symmetric-key primitives -- *Theoretical constructions of symmetric-key primitives -- III. Public-key (asymmetric) cryptography -- Number theory and cryptographic hardness assumptions -- *Algorithms for factoring and computing discrete logarithms -- Key management and the public-key revolution -- Public-key encryption -- Digital signature schemes -- *Post-quantum cryptography -- *Advanced topics in public-key encryption -- Index of common notation -- Appendix A: Mathematical background -- Appendix B: Basic algorithmic number theory.
520 ## - SUMMARY, ETC.
Summary, etc. Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.---publisher description
520 ## - SUMMARY, ETC.
Summary, etc. "Whether ensuring the privacy of data sent over the Internet, making password cracking more difficult, or providing integrity for digitally signed documents, cryptography is now part of our everyday lives. Following two previous editions that have led it to become the most relied-upon source in the field, Introduction to Modern Cryptography provides mathematically rigorous yet accessible treatment of this subject. This book's focus is on modern cryptography by its emphasis on definitions, precise assumptions, and rigorous proofs of security. A unique feature of this book is that it presents theoretical foundations with an eye toward understanding the latest cryptographic standards in wide use today. Containing worked examples and updated exercises, Introduction to Modern Cryptography can serve as a textbook for undergraduate or graduate-level course in cryptography, a reference for graduate students, researchers, and practitioners, or a general introduction suitable for self-study."--Adapted from back cover.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term NGU-sh
9 (RLIN) 5838
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
Source of heading or term NGU-sh
9 (RLIN) 5905
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lindell, Yehuda,
Relator term author.
9 (RLIN) 5915
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Arrivals Code Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Information Technology Library D Library D 11/22/2023 Academic Bookshop 3887.73 ITS202311 005.82 KAI 1004543 08/14/2024 11/22/2023 Book Non-borrowing
    Dewey Decimal Classification     Information Technology Library D Library D 11/22/2023 Academic Bookshop 3887.73 ITS202311 005.82 KAI 1004544 08/14/2024 11/22/2023 Book