MARC details
000 -LEADER |
fixed length control field |
02789nam a22003497a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250215145710.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250215b |||||||| |||| 00| 0 hin d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783030154516 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
NISER LIBRARY |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
NISER LIBRARY |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
003.26:512 |
Item number |
CHI-C |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Childs, Lindsay N. |
245 00 - TITLE STATEMENT |
Title |
Cryptology and error correction : |
Remainder of title |
an algebraic introduction and real-world applications |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
Cham, Switzerland : |
Name of publisher, distributor, etc. |
Springer, |
Date of publication, distribution, etc. |
2019. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 351 pages : |
Other physical details |
illustrations (some color) |
490 ## - SERIES STATEMENT |
Series statement |
Springer undergraduate texts in mathematics and technology, |
International Standard Serial Number |
1867-5506 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods. The objective is to provide a thorough understanding of RSA, Diffie–Hellman, and Blum–Goldwasser cryptosystems and Hamming and Reed–Solomon error correction: how they are constructed, how they are made to work efficiently, and also how they can be attacked. To reach that level of understanding requires and motivates many ideas found in a first course in abstract algebra—rings, fields, finite abelian groups, basic theory of numbers, computational number theory, homomorphisms, ideals, and cosets. Those who complete this book will have gained a solid mathematical foundation for more specialized applied courses on cryptology or error correction, and should also be well prepared, both in concepts and in motivation, to pursue more advanced study in algebra and number theory.<br/>This text is suitable for classroom or online use or for independent study. Aimed at students in mathematics, computer science, and engineering, the prerequisite includes one or two years of a standard calculus sequence. Ideally the reader will also take a concurrent course in linear algebra or elementary matrix theory. A solutions manual for the 400 exercises in the book is available to instructors who adopt the text for their course. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Algebra |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptology |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Number theory |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Caeser ciphers |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Chinese remainder theorem |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
El Gamal cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Luhn's formula |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Lagrange's theorem |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of content |
Uniform Resource Identifier |
<a href="https://link.springer.com/content/pdf/bfm:978-3-030-15453-0/1">https://link.springer.com/content/pdf/bfm:978-3-030-15453-0/1</a> |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Reviews |
Uniform Resource Identifier |
<a href="https://www.goodreads.com/book/show/43976465-cryptology-and-error-correction?from_search=true&from_srp=true&qid=uYfmI4BdRA&rank=3#CommunityReviews">https://www.goodreads.com/book/show/43976465-cryptology-and-error-correction?from_search=true&from_srp=true&qid=uYfmI4BdRA&rank=3#CommunityReviews</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Universal Decimal Classification |
Koha item type |
Book |