Cryptography : (Record no. 92428)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02134nam a22001817a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240412b2019 |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780367148591 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 STI-D |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stinson, Douglas R. |
245 ## - TITLE STATEMENT | |
Title | Cryptography : |
Remainder of title | theory and practice / |
Statement of responsibility, etc. | Douglas R. Stinson and Maura B. Paterson |
250 ## - EDITION STATEMENT | |
Edition statement | 4th |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Boca Raton |
Name of publisher, distributor, etc. | CRC Press |
Date of publication, distribution, etc. | 2019 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 580p. |
500 ## - GENERAL NOTE | |
General note | Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.<br/><br/>The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.<br/><br/>Key Features of the Fourth Edition:<br/><br/>New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).<br/>New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).<br/>New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).<br/>An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.<br/>Interesting attacks on cryptosystems, including:<br/>padding oracle attack<br/>correlation attacks and algebraic attacks on stream ciphers<br/>attack on the DUAL-EC random bit generator that makes use of a trapdoor.<br/>A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.<br/>Methods of key distribution in sensor networks.<br/>The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.<br/>The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.<br/>The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Coding theory |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Paterson, Maura B. |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
Withdrawn status |
Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Checked out | Date last seen | Date last checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | 003-007 | BITS Pilani Hyderabad | BITS Pilani Hyderabad | Text & Reference Section (Student cannot borrow these books) | 30/04/2024 | 1 | 005.82 STI-D | 48866 | 12/08/2025 | 31/12/2024 | 31/12/2024 | 12/04/2024 | Course Reference Books |