MARC details
| 000 -LEADER |
| fixed length control field |
02817nam a22003735i 4500 |
| 001 - CONTROL NUMBER |
| control field |
22663618 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CSPC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250324150925.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
220623s2022 nju 000 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2022941485 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781789450965 |
| Qualifying information |
(hardback) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
DLC |
| Modifying agency |
CSPC |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 04 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
A83 2022 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.824 |
| Item number |
As99 |
| 245 00 - TITLE STATEMENT |
| Title |
Asymmetric cryptography : |
| Remainder of title |
primitives and protocols / |
| Statement of responsibility, etc. |
coordinated by David Pointcheval. |
| 263 ## - PROJECTED PUBLICATION DATE |
| Projected publication date |
2207 |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
London ; |
| -- |
Hoboken, NJ : |
| Name of producer, publisher, distributor, manufacturer |
ISTE Ltd / John Wiley and Sons Inc., |
| Date of production, publication, distribution, manufacture, or copyright notice |
2022. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xii, 286 pages ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 490 ## - SERIES STATEMENT |
| Series statement |
Sciences. Computer science. Cryptography, data security |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Public-key encryption and security notions -- Signatures and security notions -- Zero-knowledge proofs -- Secure multiparty computation -- Pairing-based cryptography -- Broadcast encryption and traitor tracing -- Attribute-based encryption -- Advanced signatures -- Key exchange -- Password authenticated key exchange: protocols and security models -- Verifiable computation and succinct arguments for NP. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cryptography. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data encryption (Computer science). |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Pointcheval, David, |
| Relator term |
coordinator. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
0 |
| b |
ibc |
| c |
orignew |
| d |
2 |
| e |
epcn |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Suppress in OPAC |
No |
| Koha item type |
Books |
| Classification part |
005.824 |
| Item part |
As99 |
| Call number prefix |
CIR |
| Call number suffix |
2022 |