MARC details
000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
181009b2013 xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781470437336 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
652.8015 COZ-M |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Cozzens, Margaret |
245 ## - TITLE STATEMENT |
Title |
The mathematics of encryption : |
Remainder of title |
an elementary introduction / |
Statement of responsibility, etc. |
Margaret Cozzens and Steven J Miller |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
Rhode Island |
Name of publisher, distributor, etc. |
American Mathematical Society |
Date of publication, distribution, etc. |
2013 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
332 p. |
365 ## - TRADE PRICE |
Price type code |
INR |
Price amount |
1225.00. |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Mathematical World |
Volume/sequential designation |
Volume - 29. |
500 ## - GENERAL NOTE |
General note |
<br/>"How quickly can you compute the remainder when dividing 109837⁹⁷ by 120143? Why would you even want to compute this? And what does this have to do with cryptography? Modern cryptography lies at the intersection of mathematics and computer sciences, involving number theory, algebra, computational complexity, fast algorithms, and even quantum mechanics. Many people think of codes in terms of spies, but in the information age, highly mathematical codes are used every day by almost everyone, whether at the bank ATM, at the grocery checkout, or at the keyboard when you access your email or purchase products online. This book provides a historical and mathematical tour of cryptography, from classical ciphers to quantum cryptography. The authors introduce just enough mathematics to explore modern encryption methods, with nothing more than basic algebra and some elementary number theory being necessary. Complete expositions are given of the classical ciphers and the attacks on them, along with a detailed description of the famous Enigma system. The public-key system RSA is described, including a complete mathematical proof that it works. Numerous related topics are covered, such as efficiencies of algorithms, detecting and correcting errors, primality testing and digital signatures. The topics and exposition are carefully chosen to highlight mathematical thinking and problem solving. Each chapter ends with a collection of problems, ranging from straightforward applications to more challenging problems that introduce advanced topics. Unlike many books in the field, this book is aimed at a general liberal arts student, but without losing mathematical completeness."--Book cover |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Coding theory |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography--Mathematics |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Miller, Steven J |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
Withdrawn status |
|