MARC details
000 -LEADER |
fixed length control field |
05069cam a22003857a 4500 |
001 - CONTROL NUMBER |
control field |
19137700 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210930192634.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160615s2012 gw ac b 011 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2012931225 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978118545263 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978118545263 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn775403190 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BTCTA |
Language of cataloging |
eng |
Transcribing agency |
BTCTA |
Modifying agency |
OHX |
-- |
YDXCP |
-- |
BWX |
-- |
MUU |
-- |
OCLCF |
-- |
OCLCQ |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S59 2013 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8/2 |
Edition number |
23 |
245 00 - TITLE STATEMENT |
Title |
Cryptography and security |
Statement of responsibility, etc. |
C K Shyamala, N harini, T R Padmanabhan. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Heidelberg ; |
-- |
New Delhi : |
Name of publisher, distributor, etc. |
Wiley India Pvt. Ltd, |
Date of publication, distribution, etc. |
2013 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
vi, 527 p. : |
Other physical details |
ill., portraits ; |
Dimensions |
24 cm. |
490 1# - SERIES STATEMENT |
Series statement |
Lecture notes in computer science, |
International Standard Serial Number |
0302-9743 ; |
Volume/sequential designation |
6805 |
490 1# - SERIES STATEMENT |
Series statement |
LNCS sublibrary. SL 4, Security and cryptology |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
The hidden side of Jean-Jacques Quisquater / Michaël Quisquater -- On Quisquater's multiplication algorithm / Marc Joye -- A brief survey of research jointly with Jean-Jacques Cascaded / Yvo Desmedt -- DES collisions revisited / Sebastiaan Indesteege and Bart Preneel -- Line directed hypergraphs / Jean-Claude Bermond, Fahir Ergincan, and Michel Syska -- Random permutation statistics and an improved slide-determine attack on KeeLoq / Nicolas T. Courtois and Gregory V. Bard -- Self-similarity attacks on block ciphers and application to KeeLoq / Nicolas T. Courtois -- Increasing block sizes using Feistel networks: the example of the AES / Jacques Patarin, Benjamin Gittins, and Joana Treger -- Authenticated-encryption with padding: a formal security treatment / Kenneth G. Paterson and Gaven J. Watson -- Traceable signature with stepping capabilities / Olivier Blazy and David Pointcheval -- Deniable RSA signature: the raise and fall of Ali Baba / Serge Vaudenay -- Autotomic signatures / David Naccache and David Pointecheval -- Fully forward-secure group signatures / Benoît Libert and Moti Yung -- Public key encryption for the forgetful / Pu wen Wei, Yulang Zheng, and Xiaoyn Wang -- Supplemental access control (PACE v2): security analysis of PACE integrated mapping / Jean-Sébastien Coron, Aline Gouget, Thomas Icart, and Pascal Paillier -- Secret key leakage from public key perturbation of DLP-based cryptosystems / Alexandre Berzati, Cécile Canovas-Dumas, and Louis Goubin -- EM probes characterisation for security analysis / Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, and Assia Tria -- An updated survey on secure ECC implementations: attacks, countermeasures and cost / Junfeng Fan and Ingrid Verbauwhede -- Masking with randomized look up tables: towards preventing side-channel attacks of all orders / Franc̦ois-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon -- Efficient implementation of true random number generator based on SRAM PUFs / Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, and Helena Handschuh -- Operand folding hardware multipliers / Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, and Karim Sabeg -- SIMPL systems as a keyless cryptographic and security primitive / Ulrich Rührmair -- Cryptography with asynchronous logic automata / Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld -- A qualitative security analysis of a new class of 3-D integrated crypto co-processors / Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, C̦etin Kaya Koc̦, Timothy Levin, and Timothy Sherwood -- The challenges raised by the privacy-preserving identity card / Yves Deswarte and Sébastien Gambs -- The next smart card nightmare: logical attacks, combined attacks, mutant applications and other funny things / Guillaume Bouffard and Jean-Louis Lanet -- Localization privacy / Mike Burmester -- Dynamic secure cloud storage with provenance / Sherman S.M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H. Deng -- Efficient encryption and storage of close distance messages with applications to cloud storage / George Davida and Yair Frankel -- A Nagell algorithm in any characteristic / Mehdi Tibouchi -- How to read a signature? / Vanessa Gratzer and David Naccache -- Fooling a liveness-detecting capacitive fingerprint scanner / Edwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, and David J. Parish -- Physical simulation of inarticulate robots / Guillaume Claret, Michaël Mathieu, David Naccache, and Guillaume Seguin. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst00872484 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst00887935 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Naccache, David, |
Dates associated with a name |
1967- |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Lecture notes in computer science ; |
Volume/sequential designation |
6805. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
LNCS sublibrary. |
Number of part/section of a work |
SL 4, |
Name of part/section of a work |
Security and cryptology. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |