000 -LEADER |
fixed length control field |
03617nam a22004695i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151130.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131119s2013 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642413865 |
|
978-3-642-41386-5 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.D35 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.74 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg : |
-- |
Imprint: Springer, |
-- |
2013. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kościelny, Czesław. |
Relator term |
author. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Modern Cryptography Primer |
Medium |
[electronic resource] : |
Remainder of title |
Theoretical Foundations and Practical Applications / |
Statement of responsibility, etc |
by Czesław Kościelny, Mirosław Kurkowski, Marian Srebrny. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIV, 238 p. 97 illus. |
Other physical details |
online resource. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chap. 1 Basic Concepts and Historical Overview -- Chap. 2 Mathematical Foundations of Cryptography -- Chap. 3 Foundations of Symmetric Cryptography -- Chap. 4 Foundations of Asymmetric Cryptography -- Chap. 5 An Electronic Signature and Hash Functions -- Chap. 6 PGP Systems and True Crypt -- Chap. 7 Public Key Infrastructure -- Chap. 8 Cryptographic Protocols -- Chap. 9 Cryptography Application for Data Security -- References -- Index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer network architectures. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Data structures (Computer science). |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Data Structures, Cryptology and Information Theory. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
e-Commerce/e-business. |
|
Topical term or geographic name as entry element |
Computer Systems Organization and Communication Networks. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kurkowski, Mirosław. |
Relator term |
author. |
|
Personal name |
Srebrny, Marian. |
Relator term |
author. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642413858 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-41386-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |