A cryptography primer : (Record no. 651931)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02818nam a22004098i 4500 |
| 001 - CONTROL NUMBER | |
| control field | CR9781139084772 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250919142045.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
| fixed length control field | m|||||o||d|||||||| |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr|||||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 110509s2014||||enk o ||1 0|eng|d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781139084772 (ebook) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781107017887 (hardback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781107603455 (paperback) |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | UkCbUP |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | UkCbUP |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | K557 2014 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8/2 |
| Edition information | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Klein, Philip N., |
| Relator term | author. |
| 245 12 - TITLE STATEMENT | |
| Title | A cryptography primer : |
| Remainder of title | secrets and promises / |
| Statement of responsibility, etc. | Philip N. Klein, Brown University, Providence, Rhode Island. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Place of production, publication, distribution, manufacture | Cambridge : |
| Name of producer, publisher, distributor, manufacturer | Cambridge University Press, |
| Date of production, publication, distribution, manufacture, or copyright notice | 2014. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 online resource (xiii, 174 pages) : |
| Other physical details | digital, PDF file(s). |
| 336 ## - CONTENT TYPE | |
| Content type term | text |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type term | computer |
| Media type code | c |
| Source | rdamedia |
| 338 ## - CARRIER TYPE | |
| Carrier type term | online resource |
| Carrier type code | cr |
| Source | rdacarrier |
| 500 ## - GENERAL NOTE | |
| General note | Title from publisher's bibliographic system (viewed on 05 Oct 2015). |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Machine generated contents note: 1. Introduction; 2. Modular arithmetic; 3. The addition cypher, an insecure block cypher; 4. Functions; 5. Probability theory; 6. Perfect secrecy and perfectly secure cryptosystems; 7. Number theory; 8. Euclid's algorithm; 9. Some uses of perfect secrecy; 10. Computational problems, easy and hard; 11. Modular exponentiation, modular logarithm, and one-way functions; 12. Diffie and Hellman's exponential-key-agreement protocol; 13. Computationally secure single-key cryptosystems; 14. Public-key cryptosystems and digital signatures. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Data encryption (Computer science) |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Digital signatures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Telecommunication |
| General subdivision | Safety measures. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| Relationship information | Print version: |
| International Standard Book Number | 9781107017887 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://doi.org/10.1017/CBO9781139084772">https://doi.org/10.1017/CBO9781139084772</a> |
| 907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) | |
| a | .b16845882 |
| b | 2020-12-22 |
| c | 2020-12-22 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Suppress in OPAC | No |
| 998 ## - LOCAL CONTROL INFORMATION (RLIN) | |
| Library | |
| Operator's initials, OID (RLIN) | 2020-12-22 |
| Cataloger's initials, CIN (RLIN) | m |
| Material Type (Sierra) | Printed Books |
| Language | English |
| Country | |
| -- | 0 |
| -- | .b16845882 |
No items available.
