Understanding cryptography : (Record no. 2180)

MARC details
000 -LEADER
fixed length control field 03910cam a22003615i 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-CaNGU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250326131744.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250326t2024 gw fo d eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783662690062
Qualifying information (hardcover)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783662690079
Qualifying information (online resource)
040 ## - CATALOGING SOURCE
Original cataloging agency WaSeSS
Language of cataloging eng
Transcribing agency WaSeSS
Description conventions rda
Modifying agency WaSeSS
-- EG-CaNGU
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Paar, Christof,
Dates associated with a name 1963-,
Relator term author.
9 (RLIN) 6578
245 10 - TITLE STATEMENT
Title Understanding cryptography :
Remainder of title from established symmetric and asymmetric ciphers to post-quantum algorithms /
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Germany :
Name of producer, publisher, distributor, manufacturer Springer-Verlag GmbH, Springer Nature,
Date of production, publication, distribution, manufacture, or copyright notice [2024]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2024
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (XXI, 543 pages) :
Other physical details online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to Cryptography and Data Security -- Stream Ciphers -- The Data Encryption Standard (DES) and Alternatives -- The Advanced Encryption Standard (AES) -- More About Block Ciphers -- Introduction to Public-Key Cryptography -- The RSA Cryptosystem -- Public-Key Cryptosystems Based on the Discrete Logarithm Problem -- Elliptic curve Cryptosystems -- Digital Signatures -- Hash Functions -- SHA-3 (Secure Hashing Algorithm) -- Message Authentication Codes (MACs) -- Key Establishment -- Post-Quantum Cryptography.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Available on campus and off campus with authorized login.
520 ## - SUMMARY, ETC.
Summary, etc. Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications-ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. Topics and features: Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest Helps develop a comprehensive understanding of modern applied cryptography Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum Supplies up-to-date security parameters for all cryptographic algorithms Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years' experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, from whichthey have drawn important lessons for their teaching.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
Source of heading or term NGU-sh
9 (RLIN) 5905
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
Source of heading or term NGU-sh
9 (RLIN) 5906
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
Source of heading or term NGU-sh
9 (RLIN) 6579
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Quantum communication.
Source of heading or term NGU-sh
9 (RLIN) 6580
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term NGU-sh
9 (RLIN) 1203
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pelzl, Jan,
Relator term author.
9 (RLIN) 6581
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Güneysu, Tim,
Relator term author.
9 (RLIN) 6582
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name Online resource.
Uniform Resource Identifier <a href="https://mplbci.ekb.eg/EKBResearchers?url=https://link.springer.com/book/10.1007/978-3-662-69007-9">https://mplbci.ekb.eg/EKBResearchers?url=https://link.springer.com/book/10.1007/978-3-662-69007-9</a>
Public note Sign in EKB is required.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Arrivals Code Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
    Dewey Decimal Classification     Engineering - CCAS Online Online 03/26/2025 ENGCCAS202504 E1000066 03/26/2025 https://mplbci.ekb.eg/EKBResearchers?url=https://link.springer.com/book/10.1007/978-3-662-69007-9 03/26/2025 eBook