Computational number theory and modern cryptography / (Record no. 22675)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02679cam a22002655a 4500 |
| 001 - CONTROL NUMBER | |
| control field | 17495006 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20201128023910.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 121015s2013 ii a frb 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781118188583 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Transcribing agency | DLC |
| Modifying agency | DLC |
| -- | EG-ScBUE |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.82 |
| Edition number | 22 |
| Item number | YAN |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Yan, Song Y. |
| 245 10 - TITLE STATEMENT | |
| Title | Computational number theory and modern cryptography / |
| Statement of responsibility, etc | Song Y. Yan. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | [New Delhi] : |
| Name of publisher, distributor, etc | John Wiley & Sons : |
| -- | Higher Education Press, |
| Date of publication, distribution, etc | 2013. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xii, 418 p. : |
| Other physical details | ill. ; |
| Dimensions | 26 cm. |
| 500 ## - GENERAL NOTE | |
| General note | Index : p. [413]-418. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "-- |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"-- |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data encryption (Computer science) |
| Source of heading or term | BUEsh |
| 9 (RLIN) | 2635 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Number theory |
| General subdivision | Data processing. |
| Source of heading or term | BUEsh |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Source of heading or term | BUEsh |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Resource For college | Informatics and Computer Science |
| Arrived date list | October2016 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Withdrawn status | Item status | Source of classification or shelving scheme | Damaged status | Not for loan | Vendor | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Serial Enumeration / chronology | Total Checkouts | Full call number | Barcode | Date last seen | Date last borrowed | Cost, replacement price | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Baccah | Central Library | Central Library | Lower Floor | 18/10/2016 | Purchase | 840.00 | 9128 | 1 | 005.82 YAN | 000034317 | 15/07/2025 | 03/07/2019 | 1050.00 | Book - Borrowing |