opac header image

Course in cryptography (Record no. 36047)

MARC details
000 -LEADER
fixed length control field 02858nam a22003377a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250616120843.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250613b |||||||| |||| 00| 0 hin d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789349750197
040 ## - CATALOGING SOURCE
Original cataloging agency NISER LIBRARY
Language of cataloging eng
Transcribing agency NISER LIBRARY
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 519.6
Item number KNO-C
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Knospe, Heiko
245 ## - TITLE STATEMENT
Title Course in cryptography
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. India :
Name of publisher, distributor, etc. Universities Press,
Date of publication, distribution, etc. 2025.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 323 pages ;
Dimensions 27 cm.
490 ## - SERIES STATEMENT
Series statement Pure and applied undergraduate texts ;
Volume/sequential designation 40
490 ## - SERIES STATEMENT
Series statement The Sally series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. This book provides a compact course in modern cryptography. The mathematical foundations in algebra, number theory and probability are presented with a focus on their cryptographic applications. The text provides rigorous definitions and follows the provable security approach. The most relevant cryptographic schemes are covered, including block ciphers, stream ciphers, hash functions, message authentication codes, public-key encryption, key establishment, digital signatures and elliptic curves. The current developments in post-quantum cryptography are also explored, with separate chapters on quantum computing, lattice-based and code-based cryptosystems.<br/><br/>Many examples, figures and exercises, as well as SageMath (Python) computer code, help the reader to understand the concepts and applications of modern cryptography. A special focus is on algebraic structures, which are used in many cryptographic constructions and also in post-quantum systems. The essential mathematics and the modern approach to cryptography and security prepare the reader for more advanced studies.<br/><br/>The text requires only a first-year course in mathematics (calculus and linear algebra) and is also accessible to computer scientists and engineers. This book is suitable as a textbook for undergraduate and graduate courses in cryptography as well as for self-study.
521 ## - TARGET AUDIENCE NOTE
Target audience note Readership: Undergraduate students interested in cryptography.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Ciphers
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information and communication, circuits
General subdivision Communication, information
-- Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science
General subdivision Theory of data
-- Data encryption
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Quantum theory
General subdivision Axiomatics, foundations, philosophy
-- Quantum cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Number theory
General subdivision Finite fields and commutative rings (number-theoretic aspects)
-- Algebraic coding theory; cryptography
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of Contents
Uniform Resource Identifier <a href="https://www.ams.org/bookstore/pspdf/amstext-40-toc.pdf?_gl=1*yvfqac*_ga*NzkyMDE0ODczLjE3NTAwNDYzMjU.*_ga_26G4XFTR63*czE3NTAwNDYzMjQkbzEkZzEkdDE3NTAwNTQ3ODIkajUxJGwwJGgw">https://www.ams.org/bookstore/pspdf/amstext-40-toc.pdf?_gl=1*yvfqac*_ga*NzkyMDE0ODczLjE3NTAwNDYzMjU.*_ga_26G4XFTR63*czE3NTAwNDYzMjQkbzEkZzEkdDE3NTAwNTQ3ODIkajUxJGwwJGgw</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Reviews
Uniform Resource Identifier <a href="https://www.goodreads.com/book/show/52718269-a-course-in-cryptography?ref=nav_sb_ss_4_24#CommunityReviews">https://www.goodreads.com/book/show/52718269-a-course-in-cryptography?ref=nav_sb_ss_4_24#CommunityReviews</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Universal Decimal Classification
Koha item type NBHM Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Universal Decimal Classification     SMS Library SMS Library 12/06/2025   519.6 KNO-C N499 13/06/2025 13/06/2025 NBHM Books
© 2025 Copyright: Customised and Maintained by Central Library NISER

Central Library, NISER Library Building, PO-Jatni, Khurda, Odisha - 752050, India | Email: libniser@niser.ac.in Phone: +91-674-2494171

Powered by Koha