Public key cryptography : (Record no. 20234)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06404cam a2200781Ma 4500 |
001 - CONTROL NUMBER | |
control field | ocn828735989 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230823095500.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cn||||||||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120820s2013 njuad ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | E7B |
Language of cataloging | eng |
Description conventions | pn |
Transcribing agency | E7B |
Modifying agency | OCLCO |
-- | OCLCQ |
-- | YDXCP |
-- | DG1 |
-- | UKMGB |
-- | IEEEE |
-- | NOC |
-- | OCLCO |
-- | OCLCF |
-- | N$T |
-- | CDX |
-- | COO |
-- | IDEBK |
-- | EBLCP |
-- | UKDOC |
-- | DEBSZ |
-- | OCLCQ |
-- | LOA |
-- | OCLCQ |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 016182125 |
Source | Uk |
019 ## - | |
-- | 824697371 |
-- | 827623334 |
-- | 960200499 |
-- | 961570920 |
-- | 962709374 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781118482315 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 111848231X |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781118482261 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1118482263 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781283960526 |
Qualifying information | (MyiLibrary) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1283960524 |
Qualifying information | (MyiLibrary) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 9781118317129 |
Qualifying information | (cloth) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 1118317122 |
024 3# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 9781118482261 |
029 1# - (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000050824139 |
029 1# - (OCLC) | |
OCLC library identifier | CHBIS |
System control number | 010026750 |
029 1# - (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 306234947 |
029 1# - (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV041906334 |
029 1# - (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043395533 |
029 1# - (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 400042762 |
029 1# - (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 431299145 |
029 1# - (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 449341380 |
029 1# - (OCLC) | |
OCLC library identifier | NLGGC |
System control number | 35670405X |
029 1# - (OCLC) | |
OCLC library identifier | NZ1 |
System control number | 15340409 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)828735989 |
Canceled/invalid control number | (OCoLC)824697371 |
-- | (OCoLC)827623334 |
-- | (OCoLC)960200499 |
-- | (OCoLC)961570920 |
-- | (OCoLC)962709374 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5102.94 |
Item number | .B38 2013eb |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 083000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/2 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Batten, Lynn Margaret. |
245 10 - TITLE STATEMENT | |
Title | Public key cryptography : |
Remainder of title | applications and attacks / |
Statement of responsibility, etc | Lynn Margaret Batten. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Hoboken, N.J. : |
Name of publisher, distributor, etc | John Wiley & Sons, |
Date of publication, distribution, etc | ©2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (xvii, 201 pages) : |
Other physical details | illustrations. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | IEEE Press series on information and communication networks security |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur. |
526 ## - STUDY PROGRAM INFORMATION NOTE | |
Department | Media and Communication |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Public key cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | Mathematics. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | History. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | Mathematics. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Public key cryptography. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Security |
-- | Cryptography. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | Mathematics. |
Source of heading or term | fast |
-- | (OCoLC)fst00884558 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Public key cryptography. |
Source of heading or term | fast |
-- | (OCoLC)fst01082562 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
Main entry heading | Batten, Lynn Margaret. |
Title | Public key cryptography. |
Place, publisher, and date of publication | Hoboken, N.J. : John Wiley & Sons, ©2013 |
Record control number | (DLC) 2012025411 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | IEEE Press series on information & communication networks security. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://dx.doi.org/10.1002/9781118482261">http://dx.doi.org/10.1002/9781118482261</a> |
Public note | Wiley Online Library |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.