MARC details
000 -LEADER |
fixed length control field |
01658nam a22002057a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220405110108.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220405b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781138385979 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
MEN |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
: Menezes, A. J |
245 ## - TITLE STATEMENT |
Title |
Handbook of applied cryptography |
Statement of responsibility, etc. |
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. |
250 ## - EDITION STATEMENT |
Edition statement |
Special Indian Edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
©1997. |
300 ## - PHYSICAL DESCRIPTION |
Page number |
xxviii, 780 pages : |
Other physical details |
illustrations ; |
Dimensions |
26 cm |
505 ## - FORMATTED CONTENTS NOTE |
Title |
List of Tables --<br/> |
-- |
List of Figures --<br/> |
-- |
Foreword --<br/> |
-- |
Preface --<br/> |
-- |
1. Overview of Cryptography --<br/> |
-- |
2. Mathematical Background --<br/> |
-- |
3. Number-Theoretic Reference Problems --<br/> |
-- |
4. Public-Key Parameters --<br/> |
-- |
5. Pseudorandom Bits and Sequences --<br/> |
-- |
6. Stream Ciphers --<br/> |
-- |
7. Block Ciphers --<br/> |
-- |
8. Public-Key Encryption --<br/> |
-- |
9. Hash Functions and Data Integrity --<br/> |
-- |
10. Identification and Entity Authentication --<br/> |
-- |
11. Digital Signatures --<br/> |
-- |
12. Key Establishment Protocols --<br/> |
-- |
13. Key Management Techniques --<br/> |
-- |
14. Efficient Implementation --<br/> |
-- |
15. Patents and Standards --<br/> |
-- |
App. A. Bibliography of Papers from Selected Cryptographic Forums --<br/> |
-- |
References --<br/> |
-- |
Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Van Oorschot, Paul C |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vanstone, Scott A. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
5130 |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
5131 |