Handbook of applied cryptography (Record no. 1526)

MARC details
000 -LEADER
fixed length control field 01658nam a22002057a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220405110108.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220405b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138385979
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number MEN
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name : Menezes, A. J
245 ## - TITLE STATEMENT
Title Handbook of applied cryptography
Statement of responsibility, etc. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.
250 ## - EDITION STATEMENT
Edition statement Special Indian Edition
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. ©1997.
300 ## - PHYSICAL DESCRIPTION
Page number xxviii, 780 pages :
Other physical details illustrations ;
Dimensions 26 cm
505 ## - FORMATTED CONTENTS NOTE
Title List of Tables --<br/>
-- List of Figures --<br/>
-- Foreword --<br/>
-- Preface --<br/>
-- 1. Overview of Cryptography --<br/>
-- 2. Mathematical Background --<br/>
-- 3. Number-Theoretic Reference Problems --<br/>
-- 4. Public-Key Parameters --<br/>
-- 5. Pseudorandom Bits and Sequences --<br/>
-- 6. Stream Ciphers --<br/>
-- 7. Block Ciphers --<br/>
-- 8. Public-Key Encryption --<br/>
-- 9. Hash Functions and Data Integrity --<br/>
-- 10. Identification and Entity Authentication --<br/>
-- 11. Digital Signatures --<br/>
-- 12. Key Establishment Protocols --<br/>
-- 13. Key Management Techniques --<br/>
-- 14. Efficient Implementation --<br/>
-- 15. Patents and Standards --<br/>
-- App. A. Bibliography of Papers from Selected Cryptographic Forums --<br/>
-- References --<br/>
-- Index.
520 ## - SUMMARY, ETC.
Summary, etc. Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Van Oorschot, Paul C
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Vanstone, Scott A.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 5130
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 5131
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Currency Koha item type Date last checked out
    Dewey Decimal Classification     IIITDM Kurnool IIITDM Kurnool General Stacks 05.04.2022 Tan Prints India 3495.00 SI/03/21-22/0156 DT 23/3/22   005.82 MEN 0004601 05.04.2022 3495.00 05.04.2022 INR Books  
    Dewey Decimal Classification     IIITDM Kurnool IIITDM Kurnool General Stacks 05.04.2022 Tan Prints India 3495.00 SI/03/21-22/0156 DT 23/3/22 1 005.82 MEN 0004602 20.04.2023 3495.00 05.04.2022 INR Books 21.03.2023
LIBRARY HOURS
Mon - Sat : 9:00 AM - 5.30 PM
Library will remain closed on public holidays
Contact Us

Librarian
Central Libray
Indian Institute of Information Technology Design and Manufacturing Kurnool
Andhra Pradesh - 518 007

Library Email ID: library@iiitk.ac.in

Copyright @ Central Library | IIITDM Kurnool

Powered by Koha