Cryptography: a very short introduction (Record no. 63891)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01975 a2200277 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 251227b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780192882233 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 652.8 MUR |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Murphy, Sean |
| 245 ## - TITLE STATEMENT | |
| Title | Cryptography: a very short introduction |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 2nd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Oxford: |
| Name of publisher, distributor, etc | Oxford University Press, |
| Date of publication, distribution, etc | 2025. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxiv, 128p.: |
| Other physical details | pbk.: |
| Dimensions | 18 cm. |
| 440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE | |
| Title | Very Short Introductions |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes References and Index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | We are far removed from the historical situation in which cryptography was used only by militaries and governments. With vast quantities of sensitive information transferred online by individuals, companies, organizations, and nation-states, cryptography is increasingly important to everyone. Most of us, often without realizing, use cryptography on a daily basis. Cryptography: A Very Short Introduction demystifies the art of cryptography by tracing its historical use, explaining how it works, and providing examples of its practical use. This second edition highlights the important advances both in academic cryptography research and in its everyday use. In non-technical language and without assuming advanced mathematical knowledge, Cryptography: A Very Short Introduction introduces symmetric and public-key cryptography. The book then provides a detailed discussion of the design of cryptographic algorithms that are secure against quantum computers and of the development of cryptographic algorithms with advanced functionalities. It also considers new applications of cryptography including blockchain, secure messaging apps, and electronic voting.<br/><br/>https://academic.oup.com/book/59526 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Cybersecurity |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Security Protocols |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Digital Security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Online Privacy |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data Encryption |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Blockchain Applications |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Player, Rachel |
| Relator term | Co-author |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Item type | Books |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Cost, replacement price | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | General | IIT Gandhinagar | IIT Gandhinagar | 27/12/2025 | Books India | 350.00 | 652.8 MUR | 036558 | 27/12/2025 | 1 | 350.00 | Books |