Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Record no. 8460)

MARC details
000 -LEADER
fixed length control field 02417 a2200301 4500
001 - CONTROL NUMBER
control field 1032917873
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250328151425.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250324042024xx 75 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032917870
Qualifying information BC
037 ## - SOURCE OF ACQUISITION
Source of stock number/acquisition Taylor & Francis
Terms of availability GBP 56.99
Form of issue BB
040 ## - CATALOGING SOURCE
Original cataloging agency 01
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
072 7# - SUBJECT CATEGORY CODE
Subject category code PBD
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code PBCD
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code PBV
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code PBD
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code PBCD
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code PBV
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code MAT000000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code MAT036000
Source bisac
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Alexander Stanoyevitch
245 10 - TITLE STATEMENT
Title Introduction to Cryptography with Mathematical Foundations and Computer Implementations
250 ## - EDITION STATEMENT
Edition statement 1
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Chapman and Hall/CRC
Date of publication, distribution, etc. 20241014
300 ## - PHYSICAL DESCRIPTION
Extent 672 p
520 ## - SUMMARY, ETC.
Expansion of summary note From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.

No items available.