Cryptography : (Record no. 92428)

MARC details
000 -LEADER
fixed length control field 02134nam a22001817a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240412b2019 |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367148591
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82 STI-D
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stinson, Douglas R.
245 ## - TITLE STATEMENT
Title Cryptography :
Remainder of title theory and practice /
Statement of responsibility, etc. Douglas R. Stinson and Maura B. Paterson
250 ## - EDITION STATEMENT
Edition statement 4th
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Boca Raton
Name of publisher, distributor, etc. CRC Press
Date of publication, distribution, etc. 2019
300 ## - PHYSICAL DESCRIPTION
Extent 580p.
500 ## - GENERAL NOTE
General note Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.<br/><br/>The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.<br/><br/>Key Features of the Fourth Edition:<br/><br/>New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).<br/>New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).<br/>New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).<br/>An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.<br/>Interesting attacks on cryptosystems, including:<br/>padding oracle attack<br/>correlation attacks and algebraic attacks on stream ciphers<br/>attack on the DUAL-EC random bit generator that makes use of a trapdoor.<br/>A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.<br/>Methods of key distribution in sensor networks.<br/>The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.<br/>The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.<br/>The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Paterson, Maura B.
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
Withdrawn status
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Checked out Date last seen Date last checked out Price effective from Koha item type
  Dewey Decimal Classification     003-007 BITS Pilani Hyderabad BITS Pilani Hyderabad Text & Reference Section (Student cannot borrow these books) 30/04/2024 1 005.82 STI-D 48866 12/08/2025 31/12/2024 31/12/2024 12/04/2024 Course Reference Books
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2024 BITS-Library, BITS-Hyderabad, India.