000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220419b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781108795937 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.824 |
Item number |
BOS |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Bos, Joppe W. ed. |
245 ## - TITLE STATEMENT |
Title |
Computational cryptography : algorithmic aspects of cryptology |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Cambridge University Press, |
Date of publication, distribution, etc |
2022 |
Place of publication, distribution, etc |
Cambridge : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xii, 387 p. ; |
Other physical details |
ill., |
Dimensions |
23 cm |
365 ## - TRADE PRICE |
Price amount |
75.00 |
Price type code |
GBP |
Unit of pricing |
104.80 |
490 ## - SERIES STATEMENT |
Series statement |
London Mathematical Society lecture note series ; |
Volume number/sequential designation |
469 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography |
|
Topical term or geographic name as entry element |
Approximation regime |
|
Topical term or geographic name as entry element |
BKZ |
|
Topical term or geographic name as entry element |
CFRAC |
|
Topical term or geographic name as entry element |
Coppersmith method |
|
Topical term or geographic name as entry element |
Digital signature |
|
Topical term or geographic name as entry element |
ElGamel encryption |
|
Topical term or geographic name as entry element |
Gaussian heuristic |
|
Topical term or geographic name as entry element |
Hash function |
|
Topical term or geographic name as entry element |
IPsec |
|
Topical term or geographic name as entry element |
L-function |
|
Topical term or geographic name as entry element |
Modular multiplication |
|
Topical term or geographic name as entry element |
NIST |
|
Topical term or geographic name as entry element |
rho method |
|
Topical term or geographic name as entry element |
P1 method |
|
Topical term or geographic name as entry element |
Quantum computer |
|
Topical term or geographic name as entry element |
SSl |
|
Topical term or geographic name as entry element |
Wiener's attack |
|
Topical term or geographic name as entry element |
Hash function |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stam, Martijn |
Relator term |
ed. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |