000 -LEADER |
fixed length control field |
02039nam a22003017a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IN-MiVU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190826114821.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m|||||o||d| 00| 0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr uuu---uuuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180420s2010 xxu||||go|||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780511721656 ( e-book ) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
MAIN |
Language of cataloging |
eng |
Transcribing agency |
IN-MiVU |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
652.8 |
Item number |
GOL/F |
Edition number |
21 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Goldreich, Oded |
245 00 - TITLE STATEMENT |
Title |
Foundations of Cryptography : |
Remainder of title |
Volume 2: Basic Applications [ electronic resource ] / |
Statement of responsibility, etc. |
by Oded Goldreich. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cambridge: |
Name of publisher, distributor, etc. |
Cambridge University Press , |
Date of publication, distribution, etc. |
2010. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer Science |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptology and Coding |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information Theory and Coding |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Mathematics |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Discrete Mathematics |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://doi.org/10.1017/CBO9780511721656">https://doi.org/10.1017/CBO9780511721656</a> |
Link text |
https://doi.org/10.1017/CBO9780511721656 |
Public note |
View to click |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
E-Book |