A cryptography primer : (Record no. 21513)

000 -LEADER
fixed length control field 02475aam a2200349 i 4500
001 - CONTROL NUMBER
control field 016596869
003 - CONTROL NUMBER IDENTIFIER
control field Uk
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160405163400.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131119s2014 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013046193
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB402093
Source bnb
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781107603455 (pbk.) :
040 ## - CATALOGING SOURCE
Original cataloging agency StDuBDS
Language of cataloging eng
Transcribing agency StDuBDS
Modifying agency Uk
042 ## - AUTHENTICATION CODE
Authentication code ukblsr
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number K557 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82 KLE
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Klein, Philip N.,
Relator term author.
245 12 - TITLE STATEMENT
Title A cryptography primer :
Remainder of title secrets and promises /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York
Name of publisher, distributor, etc Cambridge University Press
Date of publication, distribution, etc 2014
300 ## - PHYSICAL DESCRIPTION
Extent xiii, 174 p. :
Other physical details illustrations ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Formerly CIP.
Institution to which field applies Uk
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (page 171) and index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: 1. Introduction; 2. Modular arithmetic; 3. The addition cypher, an insecure block cypher; 4. Functions; 5. Probability theory; 6. Perfect secrecy and perfectly secure cryptosystems; 7. Number theory; 8. Euclid's algorithm; 9. Some uses of perfect secrecy; 10. Computational problems, easy and hard; 11. Modular exponentiation, modular logarithm, and one-way functions; 12. Diffie and Hellman's exponential-key-agreement protocol; 13. Computationally secure single-key cryptosystems; 14. Public-key cryptosystems and digital signatures.
520 ## - SUMMARY, ETC.
Summary, etc "Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 2664
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Digital signatures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication
General subdivision Safety measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / Cryptography.
Source of heading or term bisacsh
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type
          Books School of Theoretical Physics School of Theoretical Physics Library 2016-04-05 005.82 KLE 11781 2016-04-05 2016-04-05 Books