Integer algorithms in cryptography & international assurance (Record no. 15889)

MARC details
000 -LEADER
fixed length control field 02447nam a2200277Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250806152745.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220909b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789814623742
037 ## - SOURCE OF ACQUISITION
Terms of availability Textual
040 ## - CATALOGING SOURCE
Original cataloging agency CSL
Language of cataloging eng
Transcribing agency CSL
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
084 ## - COLON CLASSIFICATION NUMBER
Classification number D65,8(B):(894) Q5 cc6
Assigning agency CSL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Verkhovsky, Boris S
Relator term author
9 (RLIN) 817326
245 #0 - TITLE STATEMENT
Title Integer algorithms in cryptography & international assurance
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Singapore :
Name of publisher, distributor, etc. World Scientific,
Date of publication, distribution, etc. 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xlii, 415p.
Other physical details : ill.
500 ## - GENERAL NOTE
General note References 401-415p.
520 ## - SUMMARY, ETC.
Summary, etc. Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication. It concentrates on the “what” and “how” behind implementing the proposed cryptographic algorithms rather than on formal proofs of “why” these algorithms work.The book consists of five parts (in 28 chapters) and describes the author's research results in: Innovative methods in cryptography (secret communication between initiated parties); Cryptanalysis (how to break the encryption algorithms based on computational complexity of integer factorization and discrete logarithm problems); How to provide a reliable transmission of information via unreliable communication channels and; How to exploit a synergetic effect that stems from combining the cryptographic and information assurance protocols.This text contains innovative cryptographic algorithms; computationally efficient algorithms for information assurance; new methods to solve the classical problem of integer factorization, which plays a key role in cryptanalysis; and numerous illustrative examples and tables that facilitate the understanding of the proposed algorithms.The fundamental ideas contained within are not based on temporary advances in technology, which might become obsolete in several years. The problems addressed in the book have their own intrinsic computational complexities, and the ideas and methods described in the book will remain important for years to come.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Algorithms
9 (RLIN) 817327
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography
9 (RLIN) 817328
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data integrity
9 (RLIN) 817329
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Classification part D65,8(B):(894) Q5 cc6
Koha item type Textual
Source of classification or shelving scheme Colon Classification (CC)
Suppress in OPAC No
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Central Science Library Central Science Library 2022-09-12 2933, 12/03/2015, Ashutosh Technical Books   D65,8(B):(894) Q5 cc6 SL1598124 2022-09-12 2022-09-12 Textual
Copyright @ Delhi University Library System