MARC details
000 -LEADER |
fixed length control field |
02136 a2200217 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
VITAP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241011142728.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180908b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780521670418 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
VITAP |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 GOL |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Goldreich, Oded |
9 (RLIN) |
9355 |
245 ## - TITLE STATEMENT |
Title |
Foundations of Cryptography Volume-II : |
Remainder of title |
Basic Applications |
Statement of responsibility, etc. |
/ Oded Goldreich |
250 ## - EDITION STATEMENT |
Edition statement |
1st Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Name of publisher, distributor, etc. |
Cambridge University Press |
Place of publication, distribution, etc. |
New Delhi |
Date of publication, distribution, etc. |
2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
Book |
Other physical details |
xxii, (373-798)p. ill. ; 24cm |
500 ## - GENERAL NOTE |
General note |
It includes Appendix, Bibliography and Index Pages<br/><br/>Book description<br/><br/>Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.<br/>Reviews<br/><br/>Review of the hardback:'This is a very complete introduction to the basics of modern complexity-theoretic cryptography. It is a solid foundation for understanding much of the current work in this area.' |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
9356 |
Topical term or geographic name entry element |
Coding Theory; Cryptography—Mathematics; Cryptography |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.cambridge.org/core/books/foundations-of-cryptography/B0B0B0D2D383082C5435E16135A521B0">https://www.cambridge.org/core/books/foundations-of-cryptography/B0B0B0D2D383082C5435E16135A521B0</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Text Book |
Classification part |
005.82 GOL |