MARC details
000 -LEADER |
fixed length control field |
04806nam a22005055i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231104114256.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151120s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783662484258 |
Canceled/invalid ISBN |
978-3-662-48425-8 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-3-662-48425-8 |
Source of number or code |
doi |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
TR-AnTOB |
Language of cataloging |
eng |
Transcribing agency |
TR-AnTOB |
Description conventions |
rda |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.D35 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UMB |
Source |
bicssc |
|
Subject category code |
COM031000 |
Source |
bisacsh |
|
Subject category code |
UMB |
Source |
thema |
|
Subject category code |
URY |
Source |
thema005.74 |
-- |
23 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
İngilizce |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
von zur Gathen, Joachim. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT |
Title |
CryptoSchool / |
Statement of responsibility, etc. |
by Joachim von zur Gathen. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2015. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer |
Springer Berlin Heidelberg : |
-- |
Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1 Introduction -- 2 Basic cryptosystems -- A Classical cryptology -- 3 The RSA cryptosystem -- B Key addition and modular arithmetic -- 4 Group cryptography and discrete logarithms -- 5 Elliptic curves -- C Breaking the unbreakable -- 6 Differential and linear cryptanalysis -- 7 Hash functions -- D Codebooks -- 8 Signatures -- 9 Security and reductions -- E Steganography -- 10 Identification and authentication -- F Transposition ciphers -- 11 Random generation -- G Some cryptographers -- 12 Proof systems and zero knowledge -- H People using cryptography -- 13 Integral lattices -- I The Zimmermann telegram -- 14 Quantum computation -- J Enigma, Turing, and Colossus -- 15 The computer algebra toolbox -- List of notation and sources of quotations, images, and ornaments -- Bibliography -- Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography — the art of making secure building blocks — and cryptanalysis — the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks. This text, based on lecture notes from the author’s many courses on the art of cryptography, consists of two interlinked parts. The first, modern part explains some of the basic systems used today and some attacks on them. However, a text on cryptology would not be complete without describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology. The first sections of this book can be used as a textbook for an introductory course to computer science or mathematics. Other sections are suitable for advanced undergraduate or graduate courses. Many exercises are included. The emphasis is on providing a (reasonably) complete explanation of the background for some selected systems. < Joachim von zur Gathen has held professorships at the universities of Toronto, Paderborn, and Bonn, each for more than a decade. He is now retired (and active). His numerous visiting professorships were in Australia, Chile, Germany, South Africa, Spain, Switzerland, Uruguay, and USA. He is founder and was editor-in-chief for 25 years of the journal computational complexity, and was on the editorial boards of several other journals. He is listed in various editions of Who's Who in the World. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data structures (Computer scienc. |
|
Topical term or geographic name entry element |
Information theory. |
|
Topical term or geographic name entry element |
Number theory. |
|
Topical term or geographic name entry element |
Field theory (Physics). |
|
Topical term or geographic name entry element |
Telecommunication. |
|
Topical term or geographic name entry element |
Data Structures and Information Theory. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I15009 |
|
Topical term or geographic name entry element |
Theory of Computation. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I16005 |
|
Topical term or geographic name entry element |
Number Theory. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/M25001 |
|
Topical term or geographic name entry element |
Field Theory and Polynomials. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/M11051 |
|
Topical term or geographic name entry element |
Communications Engineering, Networks. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/T24035 |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Springer eBooks |
Public note |
Online access link to the resource |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-662-48425-8">https://doi.org/10.1007/978-3-662-48425-8</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
E-Book |