Public key cryptography : (Record no. 42457)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04992nam a2200577 i 4500 |
001 - CONTROL NUMBER | |
control field | 6480474 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20191218152124.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151222s2013 njua ob 001 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118482261 |
Qualifying information | ebook |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118317129 |
Qualifying information | |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118482315 |
Qualifying information | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 111848231X |
Qualifying information | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1118482263 |
Qualifying information | electronic |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781118482261 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaBNVSL)mat06480474 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (IDAMS)0b00006481cffaf4 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | CaBNVSL |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | CaBNVSL |
Modifying agency | CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5102.94 |
Item number | .B38 2013eb |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/2 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Batten, Lynn Margaret, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Public key cryptography : |
Remainder of title | applications and attacks / |
Statement of responsibility, etc. | Lynn Margaret Batten. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, |
Date of production, publication, distribution, manufacture, or copyright notice | c2013. |
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | [Piscataqay, New Jersey] : |
Name of producer, publisher, distributor, manufacturer | IEEE Xplore, |
Date of production, publication, distribution, manufacture, or copyright notice | [2013] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 PDF (xvii, 201 pages) : |
Other physical details | illustrations. |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | electronic |
Source | isbdmedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | IEEE Press series on information and communication networks security ; |
Volume/sequential designation | 16 |
500 ## - GENERAL NOTE | |
General note | In Wiley online library |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Preface xii -- 0 Introduction 1 -- 0.1 The Meaning of the Word Cryptography 2 -- 0.2 Symmetric Key Cryptography 2 -- 0.3 Public Key (Asymmetric) Cryptography 5 -- 0.4 Key Establishment 8 -- 0.5 Cryptography - more than just Hiding Secrets 9 -- 0.6 Standards 10 -- 0.7 Attacks 11 -- 1 Congruence Equations 13 -- 1.1 Congruence Arithmetic 13 -- 1.1.1 Computer Examples 17 -- 1.1.2 Problems 18 -- 1.2 The Euclidean Algorithm - Finding Inverses 19 -- 1.2.1 Computer Examples 26 -- 1.2.2 Problems 27 -- 1.3 Discrete Logarithms and Diffie-Hellman Key Exchange 27 -- 1.3.1 Computer Examples 34 -- 1.3.2 Problems 35 -- 1.4 Attacking the Discrete Logarithm 37 -- 1.4.1 Computer Examples 45 -- 1.4.2 Problems 46 -- 2 The ElGamal Scheme 49 -- 2.1 Primitive Roots 49 -- 2.1.1 Computer Examples 55 -- 2.1.2 Problems 55 -- 2.2 The ElGamal Scheme 56 -- 2.2.1 Computer Examples 58 -- 2.2.2 Problems 60 -- 2.3 Security of the ElGamal Scheme 62 -- 2.3.1 Computer Examples 64 -- 2.3.2 Problems 64 -- 3 The RSA Scheme 67 -- 3.1 Euler's Theorem 67 -- 3.1.1 Computer Examples 71 -- 3.1.2 Problems 71 -- 3.2 The RSA Algorithm 71 -- 3.2.1 Computer Examples 76 -- 3.2.2 Problems 78 -- 3.3 RSA Security 79 -- 3.3.1 Computer Examples 85 -- 3.3.2 Problems 87 -- 3.4 Implementing RSA 88 -- 3.4.1 Computer Examples 90 -- 3.4.2 Problems 91 -- 4 Elliptic Curve Cryptography 93 -- 4.1 Elliptic Curves and Elliptic Curve Groups 93 -- 4.1.1 Computer Examples 102 -- 4.1.2 Problems 103 -- 4.2 Elliptic Curve Cryptography 104 -- 4.2.1 Computer Examples 109 -- 4.2.2 Problems 112 -- 4.3 The Elliptic Curve Factoring Scheme 113 -- 4.3.1 Computer Examples 115 -- 4.3.2 Problems 116 -- 5 Digital Signatures 117 -- 5.1 Hash Functions 117 -- 5.1.1 Computer Examples 129 -- 5.1.2 Problems 130 -- 5.2 Digital Signature Schemes 132 -- 5.2.1 Computer Examples 139 -- 5.2.2 Problems 141 -- 5.3 Attacks on Digital Signatures 142 -- 5.3.1 Computer Examples 150 -- 5.3.2 Problems 152 -- 6 Primality Testing 155 -- 6.1 Fermat's Approach and Wilson's Theorem 156. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6.1.1 Computer Examples 157 -- 6.1.2 Problems 158 -- 6.2 The Miller-Selfridge-Rabin Primality Test 158 -- 6.2.1 Computer Examples 164 -- 6.2.2 Problems 164 -- 6.3 True Primality Tests 165 -- 6.3.1 Computer Examples 168 -- 6.4 Mersenne Primes and the Lucas-Lehmer Test 169 -- 6.4.1 Computer Examples 171 -- 6.4.2 Problems 171 -- 6.5 Primes is in P 171 -- 6.5.1 Computer Examples 175 -- 6.5.2 Problems 176 -- 7 Factoring Methods 179 -- 7.1 Fermat Again 180 -- 7.1.1 Computer Examples 183 -- 7.1.2 Problems 185 -- 7.2 The Quadratic Sieve 185 -- 7.2.1 Computer Examples 187 -- 7.2.2 Problems 189 -- 7.3 Pollard's p - 1 and rho Methods 189 -- 7.3.1 Computer Examples 193 -- 7.3.2 Problems194 -- 7.4 Continued Fractions and Factoring194 -- 7.4.1 Computer Examples 200 -- 7.4.2 Problems 203 -- Appendix: Solutions to Problems 207 -- References 231 -- Index 236 -- Notation 239. |
506 1# - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | Restricted to subscribers or individual electronic text purchasers. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE | |
Additional physical form available note | Also available in print. |
538 ## - SYSTEM DETAILS NOTE | |
System details note | Mode of access: World Wide Web |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on PDF viewed 12/22/2015. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers |
General subdivision | Access control. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Public key cryptography. |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
695 ## - | |
-- | Cryptography |
695 ## - | |
-- | Software |
695 ## - | |
-- | Testing |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | IEEE Xplore (Online Service), |
Relator term | distributor. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | John Wiley & Sons, |
Relator term | publisher. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 9781118317129 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | IEEE Press series on information and communication networks security ; |
Volume/sequential designation | 16 |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Abstract with links to resource |
Uniform Resource Identifier | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474 |
No items available.