Asymmetric cryptography : primitives and protocols (Record no. 33015)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240408b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781789450965
Terms of availability hbk
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number POI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Pointcheval, David
Relator term ed.
245 ## - TITLE STATEMENT
Title Asymmetric cryptography : primitives and protocols
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc ISTE Ltd,
Date of publication, distribution, etc 2022
Place of publication, distribution, etc London :
300 ## - PHYSICAL DESCRIPTION
Extent xii,286 p. ;
Other physical details ill.,
Dimensions 25 cm
365 ## - TRADE PRICE
Price amount 164.95
Price type code $
Unit of pricing 86.30
490 ## - SERIES STATEMENT
Series statement Sciences. Computer science. Cryptography, data security
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index.
520 ## - SUMMARY, ETC.
Summary, etc Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves .Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Verifiable computation
Topical term or geographic name as entry element Multi-recipient encryption schemes
Topical term or geographic name as entry element Anonymous signatures
Topical term or geographic name as entry element Advanced cryptographic schemes
Topical term or geographic name as entry element Encryption
Topical term or geographic name as entry element Ciphertext
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2024-04-08 14235.19 005.82 POI 034970 2024-04-08 Books

Powered by Koha