Introduction to Modern Cryptography (Record no. 56291)

MARC details
000 -LEADER
fixed length control field 03842nam a22002897a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200226121211.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200123b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138581340
028 ## - DISTRIBUTOR NAME
Distributor Name :Variety Books Publishers & Distributors
Distributor address :B-10 Street No 2 West Vinod Nagar Delhi 110092
Bill Number :IM2688
Bill Date :18/01/2020
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82 KAT
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Katz, Jonathan
245 ## - TITLE STATEMENT
Title Introduction to Modern Cryptography
Statement of responsibility, etc / Jonathan Katz;
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton
Name of publisher, distributor, etc : CRC Press/Taylor & Francis,
Date of publication, distribution, etc ©2015
300 ## - PHYSICAL DESCRIPTION
Extent xx, 583p.
Dimensions 24cm.
365 ## - TRADE PRICE
Price amount 2695
490 ## - SERIES STATEMENT
Series statement Chapman & Hall/CRC cryptography and network security
505 ## - FORMATTED CONTENTS NOTE
Contents note Preface --<br/>I. Introduction and Classical Cryptography --<br/>Introduction --<br/>Perfectly Secret Encryption --<br/>II. Private-Key (Symmetric) Cryptography --<br/>Private-Key Encryption --Message Authentication Codes --<br/>Hash Functions and Applications --<br/>Practical Constructions of Symmetric-Key Primitives --<br/>Theoretical Constructions of Symmetric-Key Primitives --<br/>III. Public-Key (Asymmetric) Cryptography --<br/>Number Theory and Cryptographic Hardness Assumptions --<br/>Algorithms for Factoring and Computing Discrete Logarithms --<br/>Key Management and the Public-Key Revolution --<br/>Public-Key Encryption --<br/>Digital Signature Schemes --<br/>Advanced Topics in Public-Key Encryption --<br/>Index of Common Notation --<br/>Appendix A: Mathematical Background --<br/>Appendix B: Basic Algorithmic Number Theory.
520 ## - SUMMARY, ETC.
Summary, etc Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer programming, programs & data
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers -- Security -- Cryptography.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Katz, Jonathan
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Lindell, Yehuda
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Total Renewals Date checked out
        Not For Loan SNU LIBRARY SNU LIBRARY 23/01/2020 Variety Books Publishers & Distributors 2695.00   005.82 KAT 27303 30/10/2022 23/01/2020 Books    
          SNU LIBRARY SNU LIBRARY 23/01/2020 Variety Books Publishers & Distributors 2695.00 9 005.82 KAT 27304 13/12/2023 23/01/2020 Books 10 22/11/2023
          SNU LIBRARY SNU LIBRARY 23/01/2020 Variety Books Publishers & Distributors 2695.00   005.82 KAT 27305 23/01/2020 23/01/2020 Books    

© Copyright Shiv Nadar University 2012. All Rights Reserved.  Disclaimer |  Sitemap
The Shiv Nadar University has been established under U.P. Act No 12 of 2011. Shiv Nadar University is UGC Approved.