Public key cryptography : (Record no. 20234)

MARC details
000 -LEADER
fixed length control field 06404cam a2200781Ma 4500
001 - CONTROL NUMBER
control field ocn828735989
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230823095500.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn||||||||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120820s2013 njuad ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency E7B
Language of cataloging eng
Description conventions pn
Transcribing agency E7B
Modifying agency OCLCO
-- OCLCQ
-- YDXCP
-- DG1
-- UKMGB
-- IEEEE
-- NOC
-- OCLCO
-- OCLCF
-- N$T
-- CDX
-- COO
-- IDEBK
-- EBLCP
-- UKDOC
-- DEBSZ
-- OCLCQ
-- LOA
-- OCLCQ
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 016182125
Source Uk
019 ## -
-- 824697371
-- 827623334
-- 960200499
-- 961570920
-- 962709374
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118482315
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 111848231X
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118482261
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118482263
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781283960526
Qualifying information (MyiLibrary)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1283960524
Qualifying information (MyiLibrary)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781118317129
Qualifying information (cloth)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1118317122
024 3# - OTHER STANDARD IDENTIFIER
Standard number or code 9781118482261
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000050824139
029 1# - (OCLC)
OCLC library identifier CHBIS
System control number 010026750
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 306234947
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV041906334
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV043395533
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 400042762
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 431299145
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 449341380
029 1# - (OCLC)
OCLC library identifier NLGGC
System control number 35670405X
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 15340409
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)828735989
Canceled/invalid control number (OCoLC)824697371
-- (OCoLC)827623334
-- (OCoLC)960200499
-- (OCoLC)961570920
-- (OCoLC)962709374
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5102.94
Item number .B38 2013eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Batten, Lynn Margaret.
245 10 - TITLE STATEMENT
Title Public key cryptography :
Remainder of title applications and attacks /
Statement of responsibility, etc Lynn Margaret Batten.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, N.J. :
Name of publisher, distributor, etc John Wiley & Sons,
Date of publication, distribution, etc ©2013.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xvii, 201 pages) :
Other physical details illustrations.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
490 1# - SERIES STATEMENT
Series statement IEEE Press series on information and communication networks security
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test.
520 ## - SUMMARY, ETC.
Summary, etc This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur.
526 ## - STUDY PROGRAM INFORMATION NOTE
Department Media and Communication
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public key cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Mathematics.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision History.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Mathematics.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public key cryptography.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- Cryptography.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Mathematics.
Source of heading or term fast
-- (OCoLC)fst00884558
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public key cryptography.
Source of heading or term fast
-- (OCoLC)fst01082562
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Batten, Lynn Margaret.
Title Public key cryptography.
Place, publisher, and date of publication Hoboken, N.J. : John Wiley & Sons, ©2013
Record control number (DLC) 2012025411
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE Press series on information & communication networks security.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1002/9781118482261">http://dx.doi.org/10.1002/9781118482261</a>
Public note Wiley Online Library
994 ## -
-- 92
-- DG1

No items available.