Computational number theory and modern cryptography (Record no. 7456)

MARC details
000 -LEADER
fixed length control field 02944cam a22003258i 4500
001 - CONTROL NUMBER
control field 17495006
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230920020002.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121015s2012 nju b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2012032708
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118188583
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number Y358 2012
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 23
Item number YAN-C
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM083000
Source of number bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Yan, Song Y.
245 10 - TITLE STATEMENT
Title Computational number theory and modern cryptography
Statement of responsibility, etc Prof. Song Y. Yan.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 1111
300 ## - PHYSICAL DESCRIPTION
Extent xii, 418 p.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "The only book to provide a unified view of the interplay between computationalnumber theory and cryptographyComputational number theory and modern cryptography are two of the most important and fundamental research fields in information security. There are many textbooks on computational number theory or cryptography. However, textbooks integrating both topics are rare. This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics. Mathematical ideas are presented first, thereupon treating cryptography as an immediate application of the mathematical ideas. The author covers topics from number theory which are relevant for applications in public-key cryptography. The most popular public-key cryptosystems are based on difficult computational problems, such as factorization of large positive integers and the discrete logarithm problem in finite fields or on elliptic curves over finite fields. The book also covers modern topics, such as coding and lattice based cryptography, which are relevant for so-called post-quantum cryptography. The author goes over the basics in the first six chapters, followed by application to the most common cryptographic algorithms in the following three chapters. Finally areas of current research are touched in the last three chapters. Serious mathematical problems behind these applications will be explained at the level accessible to computer scientists and engineers. Makes deep mathematical problems accessible to computer scientists and engineers Based on classroom tested materials used in the US, UK and China Exercises included in every chapter Instructor resources available on the book's Companion Website "--
520 ## - SUMMARY, ETC.
Summary, etc "This book not only introduces the basic concepts and results in the two fields, but also introduces many advanced topics"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Number theory
General subdivision Data processing.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / Cryptography.
Source of heading or term bisacsh
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Cover image
Uniform Resource Identifier <a href="http://catalogimages.wiley.com/images/db/jimages/9781118188583.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118188583.jpg</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b vip
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Koha issues (borrowed), all copies 1
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Bill No. Bill Date Cost, normal purchase price PO No. PO Date Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Cost, replacement price Price effective from Vendor/Supplier Koha item type
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD Reference 20/03/2013 IN19929 2013-03-19 3881.70 IIITD/LIC/BS/2012/05/19 2013-02-21 1 1 REF 005.82 YAN-C 001452 17/05/2024 19/09/2023 $95 20/03/2013 Overseas Press India (P) Limited Books
© 2024 IIIT-Delhi, library@iiitd.ac.in