Cryptographic engineering [electronic resource] / edited by Çetin Kaya Koç

"Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic s...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Other Authors: Koç, Çetin K., 1957-
Format: Electronic eBook
Language:English
Published: New York ; London : Springer, 2008.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b8707744
006 m o d
007 cr |||||||||||
008 090311s2008 nyua ob 001 0 eng d
005 20240418143028.3
019 |a 311304522  |a 316830027  |a 402327318  |a 418276987  |a 427709623  |a 514118232  |a 618243919  |a 646788534  |a 746947715 
020 |a 9780387718170 
020 |a 0387718176 
020 |a 9780387718163  |q (print) 
020 |a 0387718168  |q (print) 
035 |a (OCoLC)spr314182331 
035 |a (OCoLC)314182331  |z (OCoLC)311304522  |z (OCoLC)316830027  |z (OCoLC)402327318  |z (OCoLC)418276987  |z (OCoLC)427709623  |z (OCoLC)514118232  |z (OCoLC)618243919  |z (OCoLC)646788534  |z (OCoLC)746947715 
037 |a spr10.1007/978-0-387-71817-0 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d IDEBK  |d OCLCQ  |d BEDGE  |d MND  |d COA  |d CEF  |d N$T  |d CDX  |d ISOBC  |d NLGGC  |d OCLCF  |d VT2  |d E7B  |d OCLCQ 
049 |a GWRE 
050 4 |a TK7895.E42  |b C79 2009eb 
245 0 0 |a Cryptographic engineering  |h [electronic resource] /  |c edited by Çetin Kaya Koç 
260 |a New York ;  |a London :  |b Springer,  |c 2008. 
300 |a 1 online resource (xxii, 517 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
504 |a Includes bibliographical references and index. 
520 1 |a "Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success."--Jacket. 
588 0 |a Print version record. 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524. 
650 0 |a Embedded computer systems  |x Design. 
650 0 |a Cryptography.  |0 http://id.loc.gov/authorities/subjects/sh85034453. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
650 7 |a Data structures (Computer science)  |2 fast  |0 (OCoLC)fst00887978. 
650 7 |a Systems engineering.  |2 fast  |0 (OCoLC)fst01141455. 
650 7 |a Telecommunication.  |2 fast  |0 (OCoLC)fst01145830. 
700 1 |a Koç, Çetin K.,  |d 1957-  |0 http://id.loc.gov/authorities/names/n99255254  |1 http://isni.org/isni/0000000117004524. 
776 0 8 |i Print version:  |t Cryptographic engineering.  |d New York ; London : Springer, 2008  |z 9780387718163  |z 0387718168  |w (OCoLC)233934930. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-0-387-71817-0  |z Full Text (via Springer) 
907 |a .b87077449  |b 03-19-20  |c 06-30-16 
998 |a web  |b 05-01-17  |c g  |d b   |e -  |f eng  |g nyu  |h 0  |i 1 
907 |a .b87077449  |b 07-02-19  |c 06-30-16 
944 |a MARS - RDA ENRICHED 
907 |a .b87077449  |b 07-06-17  |c 06-30-16 
907 |a .b87077449  |b 05-23-17  |c 06-30-16 
915 |a I 
956 |a Springer e-books 
956 |b Springer Nature - Springer Engineering eBooks 2009 English International 
999 f f |i a7ef2343-1567-57aa-bcdc-6b205791ec93  |s 2e602438-cdda-5ff4-aef8-3ad3894511e4 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e TK7895.E42 C79 2009eb  |h Library of Congress classification  |i Ebooks, Prospector  |n 1