Information-theoretic cryptography / (Record no. 10752)

MARC details
000 -LEADER
fixed length control field 01591cam a22003018i 4500
001 - CONTROL NUMBER
control field 23197412
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250304115026.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230623s2023 enk b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2023022458
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781108484336
Qualifying information (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency IISERB
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
Item number .T93 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 003.54 T95I
Edition number 23/eng20230919
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tyagi, Himanshu
Relator term author.
9 (RLIN) 31869
245 10 - TITLE STATEMENT
Title Information-theoretic cryptography /
Statement of responsibility, etc Himanshu Tyagi, Indian Institute of Science, Bangalore, Shun Watanabe, Tokyo University of Agriculture and Technology.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2309
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 504p.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "This book offers a mathematical foundation for modern cryptography. It is primarily intended as an introduction for graduate students. Readers should have a basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as the secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
9 (RLIN) 31870
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Mathematics.
9 (RLIN) 31871
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Watanabe, Shun.
Relator term author.
9 (RLIN) 31872
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Public note
    Dewey Decimal Classification   Not For Loan Reference Central Library, IISER Bhopal Central Library, IISER Bhopal On Display 05/03/2025 1 4567.00   003.54 T95I 11966 05/03/2025 7727.60 05/03/2025 Books Title recommended by Dr Ankur Raina



Contact for Queries: skpathak@iiserb.ac.in