MARC details
000 -LEADER |
fixed length control field |
02858nam a22003377a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250616120843.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250613b |||||||| |||| 00| 0 hin d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789349750197 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
NISER LIBRARY |
Language of cataloging |
eng |
Transcribing agency |
NISER LIBRARY |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
519.6 |
Item number |
KNO-C |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Knospe, Heiko |
245 ## - TITLE STATEMENT |
Title |
Course in cryptography |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
India : |
Name of publisher, distributor, etc. |
Universities Press, |
Date of publication, distribution, etc. |
2025. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 323 pages ; |
Dimensions |
27 cm. |
490 ## - SERIES STATEMENT |
Series statement |
Pure and applied undergraduate texts ; |
Volume/sequential designation |
40 |
490 ## - SERIES STATEMENT |
Series statement |
The Sally series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book provides a compact course in modern cryptography. The mathematical foundations in algebra, number theory and probability are presented with a focus on their cryptographic applications. The text provides rigorous definitions and follows the provable security approach. The most relevant cryptographic schemes are covered, including block ciphers, stream ciphers, hash functions, message authentication codes, public-key encryption, key establishment, digital signatures and elliptic curves. The current developments in post-quantum cryptography are also explored, with separate chapters on quantum computing, lattice-based and code-based cryptosystems.<br/><br/>Many examples, figures and exercises, as well as SageMath (Python) computer code, help the reader to understand the concepts and applications of modern cryptography. A special focus is on algebraic structures, which are used in many cryptographic constructions and also in post-quantum systems. The essential mathematics and the modern approach to cryptography and security prepare the reader for more advanced studies.<br/><br/>The text requires only a first-year course in mathematics (calculus and linear algebra) and is also accessible to computer scientists and engineers. This book is suitable as a textbook for undergraduate and graduate courses in cryptography as well as for self-study. |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
Readership: Undergraduate students interested in cryptography. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Coding theory |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Ciphers |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information and communication, circuits |
General subdivision |
Communication, information |
-- |
Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science |
General subdivision |
Theory of data |
-- |
Data encryption |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Quantum theory |
General subdivision |
Axiomatics, foundations, philosophy |
-- |
Quantum cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Number theory |
General subdivision |
Finite fields and commutative rings (number-theoretic aspects) |
-- |
Algebraic coding theory; cryptography |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of Contents |
Uniform Resource Identifier |
<a href="https://www.ams.org/bookstore/pspdf/amstext-40-toc.pdf?_gl=1*yvfqac*_ga*NzkyMDE0ODczLjE3NTAwNDYzMjU.*_ga_26G4XFTR63*czE3NTAwNDYzMjQkbzEkZzEkdDE3NTAwNTQ3ODIkajUxJGwwJGgw">https://www.ams.org/bookstore/pspdf/amstext-40-toc.pdf?_gl=1*yvfqac*_ga*NzkyMDE0ODczLjE3NTAwNDYzMjU.*_ga_26G4XFTR63*czE3NTAwNDYzMjQkbzEkZzEkdDE3NTAwNTQ3ODIkajUxJGwwJGgw</a> |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Reviews |
Uniform Resource Identifier |
<a href="https://www.goodreads.com/book/show/52718269-a-course-in-cryptography?ref=nav_sb_ss_4_24#CommunityReviews">https://www.goodreads.com/book/show/52718269-a-course-in-cryptography?ref=nav_sb_ss_4_24#CommunityReviews</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Universal Decimal Classification |
Koha item type |
NBHM Books |