Computational cryptography : algorithmic aspects of cryptology (Record no. 30659)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220419b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781108795937
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Item number BOS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Bos, Joppe W. ed.
245 ## - TITLE STATEMENT
Title Computational cryptography : algorithmic aspects of cryptology
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Cambridge University Press,
Date of publication, distribution, etc 2022
Place of publication, distribution, etc Cambridge :
300 ## - PHYSICAL DESCRIPTION
Extent xii, 387 p. ;
Other physical details ill.,
Dimensions 23 cm
365 ## - TRADE PRICE
Price amount 75.00
Price type code GBP
Unit of pricing 104.80
490 ## - SERIES STATEMENT
Series statement London Mathematical Society lecture note series ;
Volume number/sequential designation 469
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
Topical term or geographic name as entry element Approximation regime
Topical term or geographic name as entry element BKZ
Topical term or geographic name as entry element CFRAC
Topical term or geographic name as entry element Coppersmith method
Topical term or geographic name as entry element Digital signature
Topical term or geographic name as entry element ElGamel encryption
Topical term or geographic name as entry element Gaussian heuristic
Topical term or geographic name as entry element Hash function
Topical term or geographic name as entry element IPsec
Topical term or geographic name as entry element L-function
Topical term or geographic name as entry element Modular multiplication
Topical term or geographic name as entry element NIST
Topical term or geographic name as entry element rho method
Topical term or geographic name as entry element P1 method
Topical term or geographic name as entry element Quantum computer
Topical term or geographic name as entry element SSl
Topical term or geographic name as entry element Wiener's attack
Topical term or geographic name as entry element Hash function
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Stam, Martijn
Relator term ed.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2022-04-16 7860.00 005.824 BOS 032949 2022-04-19 Books

Powered by Koha