Cryptography: a very short introduction (Record no. 63891)

MARC details
000 -LEADER
fixed length control field 01975 a2200277 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251227b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780192882233
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 652.8 MUR
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Murphy, Sean
245 ## - TITLE STATEMENT
Title Cryptography: a very short introduction
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Oxford:
Name of publisher, distributor, etc Oxford University Press,
Date of publication, distribution, etc 2025.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 128p.:
Other physical details pbk.:
Dimensions 18 cm.
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Very Short Introductions
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes References and Index.
520 ## - SUMMARY, ETC.
Summary, etc We are far removed from the historical situation in which cryptography was used only by militaries and governments. With vast quantities of sensitive information transferred online by individuals, companies, organizations, and nation-states, cryptography is increasingly important to everyone. Most of us, often without realizing, use cryptography on a daily basis. Cryptography: A Very Short Introduction demystifies the art of cryptography by tracing its historical use, explaining how it works, and providing examples of its practical use. This second edition highlights the important advances both in academic cryptography research and in its everyday use. In non-technical language and without assuming advanced mathematical knowledge, Cryptography: A Very Short Introduction introduces symmetric and public-key cryptography. The book then provides a detailed discussion of the design of cryptographic algorithms that are secure against quantum computers and of the development of cryptographic algorithms with advanced functionalities. It also considers new applications of cryptography including blockchain, secure messaging apps, and electronic voting.<br/><br/>https://academic.oup.com/book/59526
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cybersecurity
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security Protocols
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Digital Security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Online Privacy
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Blockchain Applications
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Player, Rachel
Relator term Co-author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Copy number Cost, replacement price Koha item type
    Dewey Decimal Classification     General IIT Gandhinagar IIT Gandhinagar 27/12/2025 Books India 350.00   652.8 MUR 036558 27/12/2025 1 350.00 Books


Copyright ©  2022 IIT Gandhinagar Library. All Rights Reserved.