opac header image

Cryptology and error correction : (Record no. 35668)

MARC details
000 -LEADER
fixed length control field 02789nam a22003497a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250215145710.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250215b |||||||| |||| 00| 0 hin d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030154516
040 ## - CATALOGING SOURCE
Original cataloging agency NISER LIBRARY
Language of cataloging eng
Description conventions rda
Transcribing agency NISER LIBRARY
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 003.26:512
Item number CHI-C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Childs, Lindsay N.
245 00 - TITLE STATEMENT
Title Cryptology and error correction :
Remainder of title an algebraic introduction and real-world applications
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Cham, Switzerland :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. 2019.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 351 pages :
Other physical details illustrations (some color)
490 ## - SERIES STATEMENT
Series statement Springer undergraduate texts in mathematics and technology,
International Standard Serial Number 1867-5506
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods. The objective is to provide a thorough understanding of RSA, Diffie–Hellman, and Blum–Goldwasser cryptosystems and Hamming and Reed–Solomon error correction: how they are constructed, how they are made to work efficiently, and also how they can be attacked. To reach that level of understanding requires and motivates many ideas found in a first course in abstract algebra—rings, fields, finite abelian groups, basic theory of numbers, computational number theory, homomorphisms, ideals, and cosets. Those who complete this book will have gained a solid mathematical foundation for more specialized applied courses on cryptology or error correction, and should also be well prepared, both in concepts and in motivation, to pursue more advanced study in algebra and number theory.<br/>This text is suitable for classroom or online use or for independent study. Aimed at students in mathematics, computer science, and engineering, the prerequisite includes one or two years of a standard calculus sequence. Ideally the reader will also take a concurrent course in linear algebra or elementary matrix theory. A solutions manual for the 400 exercises in the book is available to instructors who adopt the text for their course.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algebra
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Number theory
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Caeser ciphers
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Chinese remainder theorem
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element El Gamal cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Luhn's formula
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Lagrange's theorem
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of content
Uniform Resource Identifier <a href="https://link.springer.com/content/pdf/bfm:978-3-030-15453-0/1">https://link.springer.com/content/pdf/bfm:978-3-030-15453-0/1</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Reviews
Uniform Resource Identifier <a href="https://www.goodreads.com/book/show/43976465-cryptology-and-error-correction?from_search=true&from_srp=true&qid=uYfmI4BdRA&rank=3#CommunityReviews">https://www.goodreads.com/book/show/43976465-cryptology-and-error-correction?from_search=true&from_srp=true&qid=uYfmI4BdRA&rank=3#CommunityReviews</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Universal Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Universal Decimal Classification     NISER LIBRARY NISER LIBRARY 12/02/2025 Order No. NISER/LIB/BK/PO/2024-25/40, Dt. 16/01/2025; Overseas Press India Private Limited; Invoice No. IN32038, Dt. 23/01/2025   003.26:512 CHI-C 25679 15/02/2025 15/02/2025 Book
© 2025 Copyright: Customised and Maintained by Central Library NISER

Central Library, NISER Library Building, PO-Jatni, Khurda, Odisha - 752050, India | Email: libniser@niser.ac.in Phone: +91-674-2494171

Powered by Koha