Public key cryptography : (Record no. 42457)

000 -LEADER
fixed length control field 04992nam a2200577 i 4500
001 - CONTROL NUMBER
control field 6480474
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191218152124.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151222s2013 njua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118482261
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118317129
Qualifying information print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118482315
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 111848231X
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1118482263
Qualifying information electronic
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781118482261
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat06480474
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b00006481cffaf4
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5102.94
Item number .B38 2013eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Batten, Lynn Margaret,
Relator term author.
245 10 - TITLE STATEMENT
Title Public key cryptography :
Remainder of title applications and attacks /
Statement of responsibility, etc. Lynn Margaret Batten.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons,
Date of production, publication, distribution, manufacture, or copyright notice c2013.
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [2013]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xvii, 201 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement IEEE Press series on information and communication networks security ;
Volume/sequential designation 16
500 ## - GENERAL NOTE
General note In Wiley online library
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface xii -- 0 Introduction 1 -- 0.1 The Meaning of the Word Cryptography 2 -- 0.2 Symmetric Key Cryptography 2 -- 0.3 Public Key (Asymmetric) Cryptography 5 -- 0.4 Key Establishment 8 -- 0.5 Cryptography - more than just Hiding Secrets 9 -- 0.6 Standards 10 -- 0.7 Attacks 11 -- 1 Congruence Equations 13 -- 1.1 Congruence Arithmetic 13 -- 1.1.1 Computer Examples 17 -- 1.1.2 Problems 18 -- 1.2 The Euclidean Algorithm - Finding Inverses 19 -- 1.2.1 Computer Examples 26 -- 1.2.2 Problems 27 -- 1.3 Discrete Logarithms and Diffie-Hellman Key Exchange 27 -- 1.3.1 Computer Examples 34 -- 1.3.2 Problems 35 -- 1.4 Attacking the Discrete Logarithm 37 -- 1.4.1 Computer Examples 45 -- 1.4.2 Problems 46 -- 2 The ElGamal Scheme 49 -- 2.1 Primitive Roots 49 -- 2.1.1 Computer Examples 55 -- 2.1.2 Problems 55 -- 2.2 The ElGamal Scheme 56 -- 2.2.1 Computer Examples 58 -- 2.2.2 Problems 60 -- 2.3 Security of the ElGamal Scheme 62 -- 2.3.1 Computer Examples 64 -- 2.3.2 Problems 64 -- 3 The RSA Scheme 67 -- 3.1 Euler's Theorem 67 -- 3.1.1 Computer Examples 71 -- 3.1.2 Problems 71 -- 3.2 The RSA Algorithm 71 -- 3.2.1 Computer Examples 76 -- 3.2.2 Problems 78 -- 3.3 RSA Security 79 -- 3.3.1 Computer Examples 85 -- 3.3.2 Problems 87 -- 3.4 Implementing RSA 88 -- 3.4.1 Computer Examples 90 -- 3.4.2 Problems 91 -- 4 Elliptic Curve Cryptography 93 -- 4.1 Elliptic Curves and Elliptic Curve Groups 93 -- 4.1.1 Computer Examples 102 -- 4.1.2 Problems 103 -- 4.2 Elliptic Curve Cryptography 104 -- 4.2.1 Computer Examples 109 -- 4.2.2 Problems 112 -- 4.3 The Elliptic Curve Factoring Scheme 113 -- 4.3.1 Computer Examples 115 -- 4.3.2 Problems 116 -- 5 Digital Signatures 117 -- 5.1 Hash Functions 117 -- 5.1.1 Computer Examples 129 -- 5.1.2 Problems 130 -- 5.2 Digital Signature Schemes 132 -- 5.2.1 Computer Examples 139 -- 5.2.2 Problems 141 -- 5.3 Attacks on Digital Signatures 142 -- 5.3.1 Computer Examples 150 -- 5.3.2 Problems 152 -- 6 Primality Testing 155 -- 6.1 Fermat's Approach and Wilson's Theorem 156.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.1.1 Computer Examples 157 -- 6.1.2 Problems 158 -- 6.2 The Miller-Selfridge-Rabin Primality Test 158 -- 6.2.1 Computer Examples 164 -- 6.2.2 Problems 164 -- 6.3 True Primality Tests 165 -- 6.3.1 Computer Examples 168 -- 6.4 Mersenne Primes and the Lucas-Lehmer Test 169 -- 6.4.1 Computer Examples 171 -- 6.4.2 Problems 171 -- 6.5 Primes is in P 171 -- 6.5.1 Computer Examples 175 -- 6.5.2 Problems 176 -- 7 Factoring Methods 179 -- 7.1 Fermat Again 180 -- 7.1.1 Computer Examples 183 -- 7.1.2 Problems 185 -- 7.2 The Quadratic Sieve 185 -- 7.2.1 Computer Examples 187 -- 7.2.2 Problems 189 -- 7.3 Pollard's p - 1 and rho Methods 189 -- 7.3.1 Computer Examples 193 -- 7.3.2 Problems194 -- 7.4 Continued Fractions and Factoring194 -- 7.4.1 Computer Examples 200 -- 7.4.2 Problems 203 -- Appendix: Solutions to Problems 207 -- References 231 -- Index 236 -- Notation 239.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/22/2015.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Access control.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Public key cryptography.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
695 ## -
-- Cryptography
695 ## -
-- Software
695 ## -
-- Testing
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online Service),
Relator term distributor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element John Wiley & Sons,
Relator term publisher.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781118317129
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE Press series on information and communication networks security ;
Volume/sequential designation 16
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474

No items available.


International Institute of Information Technology, Bangalore
26/C, Electronics City, Hosur Road,Bengaluru-560100 Contact Us
Koha & OPAC at IIITB deployed by Bhargav Sridhar & Team.

Powered by Koha