• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
A cryptography primer :

پدید آورنده
Philip N. Klein, Brown University, Providence, Rhode Island

موضوع
Computer security,Data encryption (Computer science),Digital signatures,Telecommunication-- Safety measures

رده
QA76
.
9
.
A25
K557
2014

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1107017882 (hardback)
(Number (ISBN
1107603455 (paperback)
(Number (ISBN
9781107017887 (hardback)
(Number (ISBN
9781107603455 (paperback)

NATIONAL BIBLIOGRAPHY NUMBER

Number
dltt

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
A cryptography primer :
General Material Designation
[Book]
Other Title Information
secrets and promises /
First Statement of Responsibility
Philip N. Klein, Brown University, Providence, Rhode Island

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xiii, 174 pages :
Other Physical Details
illustrations ;
Dimensions
23 cm

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index

CONTENTS NOTE

Text of Note
Introduction -- Modular arithmetic -- The addition cypher, an insecure block cypher -- Functions -- Probability theory -- Perfect secrecy and perfectly secure cryptosystems -- Number theory -- Euclid's algorithm -- Some uses of perfect secrecy -- Computational problems, easy and hard -- Modular exponentiation, modular logarithm, and one-way functions -- Diffie and Hellman's exponential-key-agreement protocol -- Computationally secure single-key cryptosystems -- Public-key cryptosystems and digital signatures
0

SUMMARY OR ABSTRACT

Text of Note
"Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure"--

TOPICAL NAME USED AS SUBJECT

Computer security
Data encryption (Computer science)
Digital signatures
Telecommunication-- Safety measures

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8/2
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
K557
2014

PERSONAL NAME - PRIMARY RESPONSIBILITY

Klein, Philip N.

ORIGINATING SOURCE

Date of Transaction
20160712084137.0
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival