Cryptology for engineers: An application-oriented mathematical introduction (Record no. 359208)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01705nam a22002057a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250827154952.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250827b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780000989222 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | AACR-II |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 SCH |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Schmied, Robert |
9 (RLIN) | 13646 |
245 ## - TITLE STATEMENT | |
Title | Cryptology for engineers: An application-oriented mathematical introduction |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Singapore |
Name of publisher, distributor, etc. | World Scientific Publishing |
Date of publication, distribution, etc. | 2023 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 361 p. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants — but do we want to disclose private information while executing a sensitive Bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business discussion? Do we want to allow ambient communication concerning us to be manipulated while control software is driving our autonomous car along a steep slope? Questions like these make it clear why issues of security are a great concern in our increasingly augmented world. Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographic functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' Requirements on the other. Numerous examples computable by hand or with a small additional cost in most cases are provided inside. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptographic algorithms |
9 (RLIN) | 13647 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Mathematical principles |
9 (RLIN) | 13648 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Date last seen | Total Checkouts | Full call number | Barcode | Cost, replacement price | Price effective from | Koha item type | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Withdrawn status | Home library | Current library | Date acquired |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2025-08-27 | 005.8 SCH | 179512 | 1295.00 | 2025-08-27 | Books | Not Missing | Dewey Decimal Classification | Not Damaged | Gandhi Smriti Library | Gandhi Smriti Library | 2025-08-27 |