Public-Key Cryptography Theory And Practice. (Record no. 25671)

MARC details
000 -LEADER
fixed length control field 09082nam a22003733i 4500
001 - CONTROL NUMBER
control field EBC5127376
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190110094844.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2004 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131742105
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5127376
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5127376
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL265227
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)816564851
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 23rd
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Abhijit, Das.
245 10 - TITLE STATEMENT
Title Public-Key Cryptography Theory And Practice.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (585 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Public-key CryptographyTheory and Practice -- Copyright -- Contents -- Preface -- Notations -- Overview -- Introduction -- Common Cryptographic Primitives -- The Classical Problem: Secure Transmission of Messages -- Key Exchange -- Digital Signatures -- Entity Authentication -- Secret Sharing -- Hashing -- Certification -- Public-key Cryptography -- The Mathematical Problems -- Realization of Key Pairs -- Public-key Cryptanalysis -- Some Cryptographic Terms -- Models of Attacks -- Models of Passive Attacks -- Public Versus Private Algorithms -- Mathematical Concepts -- Introduction -- Sets, Relations and Functions -- Set Operations -- Relations -- Functions -- The Axioms of Mathematics -- Groups -- Definition and Basic Properties -- Subgroups, Cosets and Quotient Groups -- Homomorphisms -- Generators and Orders -- Sylow's Theorem -- Rings -- Definition and Basic Properties -- Subrings, Ideals and Quotient Rings -- Homomorphisms -- Factorization in Rings -- Integers -- Divisibility -- Congruences -- Quadratic Residues -- Some Assorted Topics -- Polynomials -- Elementary Properties -- Roots of Polynomials -- Algebraic Elements and Extensions -- Vector Spaces and Modules -- Vector Spaces -- Modules -- Algebras -- Fields -- Splitting Fields and Algebraic Closure -- Elements of Galois Theory -- Finite Fields -- Existence and Uniqueness of Finite Fields -- Polynomials over Finite Fields -- Representation of Finite Fields -- Affine and Projective Curves -- Plane Curves -- Polynomial and Rational Functions on Plane Curves -- Maps Between Plane Curves -- Divisors on Plane Curves -- Elliptic Curves -- The Weierstrass Equation -- The Elliptic Curve Group -- Elliptic Curves over Finite Fields -- Hyperelliptic Curves -- The Defining Equations -- Polynomial and Rational Functions -- The Jacobian -- Number Fields -- Some Commutative Algebra.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Number Fields and Rings -- Unique Factorization of Ideals -- Norms of Ideals -- Rational Primes in Number Rings -- Units in a Number Ring -- p-adic Numbers -- The Arithmetic of p-adic Numbers -- The p-adic Valuation -- Hensel's Lemma -- Statistical Methods -- Random Variables and Their Probability Distributions -- Operations on Random Variables -- Expectation, Variance and Correlation -- Some Famous Probability Distributions -- Sample Mean, Variation and Correlation -- Algebraic and Number-theoretic Computations -- Introduction -- Complexity Issues -- Order Notations -- Randomized Algorithms -- Reduction Between Computational Problems -- Multiple-precision Integer Arithmetic -- Representation of Large Integers -- Basic Arithmetic Operations -- GCD -- Modular Arithmetic -- Elementary Number-theoretic Computations -- Primality Testing -- Generating Random Primes -- Modular Square Roots -- Arithmetic in Finite Fields -- Arithmetic in the Ring F2[X] -- Finite Fields of Characteristic 2 -- Selecting Suitable Finite Fields -- Factoring Polynomials over Finite Fields -- Arithmetic on Elliptic Curves -- Point Arithmetic -- Counting Points on Elliptic Curves -- Choosing Good Elliptic Curves -- Arithmetic on Hyperelliptic Curves -- Arithmetic in the Jacobian -- Counting Points in Jacobians of Hyperelliptic Curves -- Random Numbers -- Pseudorandom Bit Generators -- Cryptographically Strong Pseudorandom Bit Generators -- Seeding Pseudorandom Bit Generators -- The Intractable Mathematical Problems -- Introduction -- The Problems at a Glance -- The Integer Factorization Problem -- Older Algorithms -- The Quadratic Sieve Method -- Factorization Using Elliptic Curves -- The Number Field Sieve Method -- The Finite Field Discrete Logarithm Problem -- Square Root Methods -- The Index Calculus Method -- Algorithms for Prime Fields.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Algorithms for Fields of Characteristic 2 -- The Elliptic Curve Discrete Logarithm Problem (ECDLP) -- The MOV Reduction -- The SmartASS Method -- The Xedni Calculus Method -- The Hyperelliptic Curve Discrete Logarithm Problem -- Choosing the Factor Base -- Checking the Smoothness of a Divisor -- The Algorithm -- Solving Large Sparse Linear Systems over Finite Rings -- Structured Gaussian Elimination -- The Conjugate Gradient Method -- The Lanczos Method -- The Wiedemann Method -- The Subset Sum Problem -- The Low-Density Subset Sum Problem -- The Lattice-Basis Reduction Algorithm -- Cryptographic Algorithms -- Introduction -- Secure Transmission of Messages -- The RSA Public-key Encryption Algorithm -- The Rabin Public-key Encryption Algorithm -- The Goldwasser-Micali Encryption Algorithm -- The Blum-Goldwasser Encryption Algorithm -- The ElGamal Public-key Encryption Algorithm -- The Chor-Rivest Public-key Encryption Algorithm -- The XTR Public-key Encryption Algorithm -- The NTRU Public-key Encryption Algorithm -- Key Exchange -- Basic Key-Exchange Protocols -- Authenticated Key-Exchange Protocols -- Digital Signatures -- The RSA Digital Signature Algorithm -- The Rabin Digital Signature Algorithm -- The ElGamal Digital Signature Algorithm -- The Schnorr Digital Signature Algorithm -- The Nyberg-Rueppel Digital Signature Algorithm -- The Digital Signature Algorithm -- The Elliptic Curve Digital Signature Algorithm -- The XTR Signature Algorithm -- The NTRUSign Algorithm -- Blind Signature Schemes -- Undeniable Signature Schemes -- Signcryption -- Entity Authentication -- Passwords -- Challenge-Response Algorithms -- Zero-Knowledge Protocols -- Standards -- Introduction -- IEEE Standards -- The Data Types -- Conversion Among Data Types -- RSA Standards -- PKCS #1 -- PKCS #3 -- Cryptanalysis in Practice -- Introduction -- Side-Channel Attacks.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Timing Attack -- Power Analysis -- Fault Analysis -- Backdoor Attacks -- Attacks on RSA -- An Attack on ElGamal Signatures -- An Attack on ElGamal Encryption -- Countermeasures -- Quantum Computation and Cryptography -- Introduction -- Quantum Computation -- System -- Entanglement -- Evolution -- Measurement -- The Deutsch Algorithm -- Quantum Cryptography -- Quantum Cryptanalysis -- Shor's Algorithm for Computing Period -- Breaking RSA -- Factoring Integers -- Computing Discrete Logarithms -- Symmetric Techniques -- Introduction -- Block Ciphers -- A Case Study: DES -- The Advanced Standard: AES -- Multiple Encryption -- Modes of Operation -- Stream Ciphers -- Linear Feedback Shift Registers -- Stream Ciphers Based on LFSRs -- Hash Functions -- Merkle's Meta Method -- The Secure Hash Algorithm -- Key Exchange in Sensor Networks -- Complexity Theory and Cryptography -- Introduction -- Provably Difficult Computational Problems Are not Suitable -- One-way Functions and the Complexity Class UP -- Introduction -- Security Issues in a Sensor Network -- The Basic Bootstrapping Framework -- The Basic Random Key Predistribution Scheme -- The q-composite Scheme -- Multi-path Key Reinforcement -- Random Pairwise Scheme -- Multi-hop Range Extension -- Polynomial-pool-based Key Predistribution -- Pairwise Key Predistribution -- Grid-based Key Predistribution -- Matrix-based Key Predistribution -- Location-aware Key Predistribution -- Closest Pairwise Keys Scheme -- Location-aware Polynomial-pool-based Scheme -- Complexity Theoryand Cryptography -- Hints to Selected Exercises -- References -- Index.
520 ## - SUMMARY, ETC.
Summary, etc Public-key Cryptography provides a comprehensive coverage of the mathematical tools required for understanding the techniques of public-key cryptography and cryptanalysis. Key topics covered in the book include common cryptographic primitives and symmetric techniques, quantum cryptography, complexity theory, and practical cryptanalytic techniques such as side-channel attacks and backdoor attacks.Organized into eight chapters and supplemented with four appendices, this book is designed to be a self-sufficient resource for all students, teachers and researchers interested in the field of cryptography.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name C.E, Madhavan Veni.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Abhijit, Das
Title Public-Key Cryptography Theory And Practice
Place, publisher, and date of publication Noida : Pearson India,c2004
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127376">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127376</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Online access     CENTRAL LIBRARY Digital Library Digital Library 10/01/2019   005.82 ABH-P E0155 10/01/2019 10/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery