000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240408b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781789450965 |
Terms of availability |
hbk |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
POI |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Pointcheval, David |
Relator term |
ed. |
245 ## - TITLE STATEMENT |
Title |
Asymmetric cryptography : primitives and protocols |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
ISTE Ltd, |
Date of publication, distribution, etc |
2022 |
Place of publication, distribution, etc |
London : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xii,286 p. ; |
Other physical details |
ill., |
Dimensions |
25 cm |
365 ## - TRADE PRICE |
Price amount |
164.95 |
Price type code |
$ |
Unit of pricing |
86.30 |
490 ## - SERIES STATEMENT |
Series statement |
Sciences. Computer science. Cryptography, data security |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves .Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Verifiable computation |
|
Topical term or geographic name as entry element |
Multi-recipient encryption schemes |
|
Topical term or geographic name as entry element |
Anonymous signatures |
|
Topical term or geographic name as entry element |
Advanced cryptographic schemes |
|
Topical term or geographic name as entry element |
Encryption |
|
Topical term or geographic name as entry element |
Ciphertext |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |