skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Introduction to cryptography Preview this item
ClosePreview this item
Checking...

Introduction to cryptography

Author: Sahadeo Padhye; Rajeev A Sahu; Vishal Saraswat
Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2018] ©2018
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"Electronic communication and financial transactions have assumed massive proportions today. But they comprise high risks too. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT.?This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. Students who have elementary knowledge of  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Padhye, Sahadeo.
Introduction to cryptography.
Boca Raton, FL : CRC Press, Taylor & Francis Group, [2018]
(DLC) 2018002460
(OCoLC)1025358432
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Sahadeo Padhye; Rajeev A Sahu; Vishal Saraswat
ISBN: 9781315114590 1315114593 9781351628150 1351628151 9781351628136 1351628135 9781351628129 1351628127
OCLC Number: 1053888392
Notes: "A science publishers book."
Description: 1 online resource (xv, 251 pages) : illustrations
Contents: <P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P> Notation Types of algorithm Complexity Classes Exercise Classical Cryptosystems Classification of Classical Cryptosystem Block Cipher Stream Cipher Cryptanalysis of Cryptosystems Exercise Block Ciphers Introduction Modes of Operation Padding Design Considerations Data Encryption Standard Advanced Encryption Standard Exercise Hash Function Compression and Hash Functions Hash function for cryptography Random Oracle Model Cryptographic Hash Functions Exercise Public Key Cryptosystem Introduction Diffie-Hellman Key Exchange Protocol RSA Cryptosystem Rabin Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystem Exercises Digital Signature Formal Definitions Attack Goals for Digital. Cover; Title Page; Copyright Page; Dedication; Foreword; Preface; Table of Contents; 1 Overview of Cryptography; 1.1 Introduction; 1.2 Goals of Cryptography; 1.3 Classification of Cryptosystem; 1.4 Practically Useful Cryptosystem; 1.4.1 Confusion and Diffusion; 1.5 Cryptanalysis; 1.5.1 Types of Attackers; 1.5.2 Types of Attacks; 1.5.3 Security Notions; 2 Basic Algebra; 2.1 Group; 2.2 Ring; 2.3 Field; 2.3.1 Finite Field; 2.3.2 Field Construction; 2.3.3 Field Construction using Irreducible Polynomial; 2.3.4 Galois Field GF(2n); 2.3.4.1 Integer Representation of Finite Field Elements. 2.3.5 Field Construction using Generator2.4 Exercises; 3 Number Theory; 3.1 Prime Numbers; 3.2 Cardinality of Primes; 3.3 Extended Euclidean Algorithm; 3.4 Congruences; 3.4.1 Solving Linear Congruence in Zn; 3.4.2 Chinese Remainder Theorem (CRT); 3.5 Integer Factorization Problem; 3.5.1 Trial Division Method; 3.5.2 Fermat's Method; 3.5.3 Pollard's p --
1 Method; 3.5.4 Pollard's Rho Method; 3.5.5 Quadratic Sieve; 3.5.6 Number Field Sieve; 3.6 Primality Testing; 3.6.1 Sieve of Eratosthenes; 3.6.2 Divisibility Algorithm; 3.6.3 AKS Algorithm; 3.6.4 Fermat Test; 3.6.5 Miller-Rabin Algorithm. 3.7 Quadratic Congruence3.7.1 Quadratic Residue or Non-Residue; 3.7.2 Legendre Symbol and Jacobi Symbol; 3.8 Exponentiation and Logarithm; 3.8.1 Square and Multiply Method; 3.9 Discrete Logarithm Problem; 3.9.1 Shank's Baby-Step Giant-Step Algorithm; 3.9.2 Pollard's Rho Algorithm; 3.9.3 Pohlig-Hellman Algorithm; 3.9.4 Index Calculus Algorithm; 3.10 Exercises; 4 Probability and Perfect Secrecy; 4.1 Basic Concept of Probability; 4.2 Birthday Paradox; 4.3 Perfect Secrecy; 4.4 Vernam One-Time Pad; 4.5 Random Number Generation; 4.6 Pseudo-random Number Generator; 4.7 Exercises; 5 Complexity Theory. 5.1 Running Time and Size of Input5.2 Big-O Notation; 5.2.1 Big-O and Growth Rate; 5.2.2 Properties of Order Notation; 5.3 Types of Algorithm; 5.4 Complexity Classes; 5.5 Exercises; 6 Classical Cryptosystems; 6.1 Classification of Classical Cryptosystem; 6.2 Block Cipher; 6.2.1 Substitution Cipher; 6.2.1.1 Shift Cipher; 6.2.1.2 Affine Cipher; 6.2.1.3 Substitution Cipher; 6.2.1.4 Vigenere Cipher; 6.2.1.5 Hill Cipher; 6.2.2 Transposition Cipher; 6.2.2.1 Scytale; 6.2.2.2 The Rail Fence Cipher; 6.3 Stream Cipher; 6.3.1 Synchronous Stream Cipher. 6.3.1.1 Vigenere Cipher as Synchronous Stream Cipher6.3.2 Linear Feedback Shift Register (LFSR); 6.3.3 Non-Synchronous Stream Cipher; 6.3.3.1 Autokey Cipher; 6.4 Cryptanalysis of Cryptosystems; 6.4.1 Frequency Analysis; 6.4.2 Cryptanalysis of Affine Cipher; 6.4.3 Cryptanalysis of Substitution Cipher; 6.4.4 Cryptanalysis of Vigenere Cipher; 6.4.5 Cryptanalysis of Hill Cipher; 6.4.6 Cryptanalysis of LFSR Stream Cipher; 6.5 Exercises; 7 Block Ciphers; 7.1 Introduction; 7.1.1 Notations; 7.2 Modes of Operation; 7.2.1 Electronic Code Book (ECB); 7.2.1.1 ECB Properties.
Responsibility: Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat.

Abstract:

"Electronic communication and financial transactions have assumed massive proportions today. But they comprise high risks too. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT.?This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. Students who have elementary knowledge of mathematics, will be introduced to mathematical notions relevant to cryptography, and the design and analysis of the cryptographic schemes. More advanced students who have already a background of algebra, number theory, probability and algorithms; will be able to review the applications of secure systems and will be introduced to cryptographic primitives and current research, besides being exposed to scope of future research addressing the open problems in related area. This book gives more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research."--Provided by publisher.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1053888392<\/a>> # Introduction to cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1053888392<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/mathematics_combinatorics<\/a>> ; # MATHEMATICS--Combinatorics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/number_theory<\/a>> ; # Number theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/computers_cryptography<\/a>> ; # COMPUTERS--Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/cryptography_mathematics<\/a>> ; # Cryptography--Mathematics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/algorithms<\/a>> ; # Algorithms<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/003.54\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/technology_&_engineering_operations_research<\/a>> ; # TECHNOLOGY & ENGINEERING--Operations Research<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/science_system_theory<\/a>> ; # SCIENCE--System Theory<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Person\/sahu_rajeev_a<\/a>> ; # Rajeev A. Sahu<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Person\/saraswat_vishal<\/a>> ; # Vishal Saraswat<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Person\/padhye_sahadeo<\/a>> ; # Sahadeo Padhye<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Notation Types of algorithm Complexity Classes Exercise Classical Cryptosystems Classification of Classical Cryptosystem Block Cipher Stream Cipher Cryptanalysis of Cryptosystems Exercise Block Ciphers Introduction Modes of Operation Padding Design Considerations Data Encryption Standard Advanced Encryption Standard Exercise Hash Function Compression and Hash Functions Hash function for cryptography Random Oracle Model Cryptographic Hash Functions Exercise Public Key Cryptosystem Introduction Diffie-Hellman Key Exchange Protocol RSA Cryptosystem Rabin Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystem Exercises Digital Signature Formal Definitions Attack Goals for Digital.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"

<\/P>

<\/P>

Preface <\/P>

<\/P>

Overview of Cryptography<\/P><\/B>

Introduction <\/P>

Goals of Cryptography <\/P><\/B>

Classification of Cryptosystem<\/P>

Practically Useful Cryptosystem<\/P>

Cryptanalysis<\/P>

<\/P>

Basic Algebra<\/P><\/B>

Group<\/P>

Ring<\/P>

Field<\/P>

Exercise<\/P>

<\/P>

Number Theory<\/P><\/B>

Introduction<\/P>

Prime Numbers<\/P>

Cardinality of Primes<\/P>

Extended Euclidean Algorithm<\/P>

Primality Testing<\/P>

Factorization and Algorithms for it<\/P>

Congruences<\/P>

Quadratic Congruence<\/P>

Exponentiation and Logarithm<\/P>

Discrete Logarithm Problem and Algorithms for it<\/P>

Exercise<\/P>

<\/P>

Probability and Perfect Secrecy<\/P><\/B>

Basic Concept of Probability <\/P>

Birthday Paradox<\/P>

Perfect Secrecy<\/P>

Vernam One Time Pad<\/P>

Random Number Generation<\/P>

Pseudo-random Number Generator<\/P>

Exercise<\/P>

<\/P>

Complexity Theory <\/P><\/B>

Running Time and Size of Input <\/P>

Big-O Notation <\/P>

Types of algorithm<\/P>

Complexity Classes<\/P>

Exercise<\/P>

<\/P>

Classical Cryptosystems<\/P><\/B>

Classification of Classical Cryptosystem<\/P>

Block Cipher<\/P>

Stream Cipher<\/P>

Cryptanalysis of Cryptosystems<\/P>

Exercise<\/P>

<\/P>

<\/P>

Block Ciphers<\/P><\/B>

Introduction<\/P>

Modes of Operation<\/P>

Padding<\/P>

Design Considerations <\/P>

Data Encryption Standard <\/P>

Advanced Encryption Standard<\/P>

Exercise <\/P>

<\/P>

Hash Function <\/P><\/B>

Compression and Hash Functions <\/P>

Hash function for cryptography <\/P>

Random Oracle Model <\/P>

Cryptographic Hash Functions<\/P>

Exercise<\/P>

Public Key Cryptosystem<\/P><\/B>

Introduction <\/P>

Diffie-Hellman Key Exchange Protocol <\/P>

RSA Cryptosystem<\/P>

Rabin Cryptosystem<\/P>

ElGamal Cryptosystem<\/P>

Elliptic Curve Cryptosystem<\/P>

Exercises <\/P>

<\/P>

Digital Signature<\/P><\/B>

Formal Definitions <\/P>

Attack Goals for Digital Signature<\/P>

Digital Signature in Practice<\/P>

Some Popular Digital Signatures <\/P>

Exercises<\/P>

<\/P>

Research Directions in Cryptography <\/P><\/B>

Pairing-Based Cryptography<\/P>

Zero-knowledge Proof System<\/P>

Authenticated Group Key Exchange<\/P>

Attribute-Based Cryptography<\/P>

Homomorphic Encryption <\/P>

Secure Multi-party Computation<\/P>

Secret Sharing<\/P>

Post-Quantum Cryptography <\/P>

Side-Channel Analysis<\/P>

References<\/P>

Index<\/P><\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"Electronic communication and financial transactions have assumed massive proportions today. But they comprise high risks too. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT.?This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. Students who have elementary knowledge of mathematics, will be introduced to mathematical notions relevant to cryptography, and the design and analysis of the cryptographic schemes. More advanced students who have already a background of algebra, number theory, probability and algorithms; will be able to review the applications of secure systems and will be introduced to cryptographic primitives and current research, besides being exposed to scope of future research addressing the open problems in related area. This book gives more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.\"--Provided by publisher.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Cover; Title Page; Copyright Page; Dedication; Foreword; Preface; Table of Contents; 1 Overview of Cryptography; 1.1 Introduction; 1.2 Goals of Cryptography; 1.3 Classification of Cryptosystem; 1.4 Practically Useful Cryptosystem; 1.4.1 Confusion and Diffusion; 1.5 Cryptanalysis; 1.5.1 Types of Attackers; 1.5.2 Types of Attacks; 1.5.3 Security Notions; 2 Basic Algebra; 2.1 Group; 2.2 Ring; 2.3 Field; 2.3.1 Finite Field; 2.3.2 Field Construction; 2.3.3 Field Construction using Irreducible Polynomial; 2.3.4 Galois Field GF(2n); 2.3.4.1 Integer Representation of Finite Field Elements.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5447213839<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1025358432<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Introduction to cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1053888392<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9781351628150<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.taylorfrancis.com\/books\/e\/9781315114590<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9781351628136<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5508462<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1769573<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.taylorfrancis.com\/books\/e\/9781351628150<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/nls.ldls.org.uk\/welcome.html?ark:\/81055\/vdc_100066277761.0x000001<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1201\/9781315114590<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351628129<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351628136<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781315114590<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351628150<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB8G6110<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1053888392<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/003.54\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Person\/padhye_sahadeo<\/a>> # Sahadeo Padhye<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Padhye<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Sahadeo<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Sahadeo Padhye<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Person\/sahu_rajeev_a<\/a>> # Rajeev A. Sahu<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Sahu<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Rajeev A.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rajeev A. Sahu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Person\/saraswat_vishal<\/a>> # Vishal Saraswat<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Saraswat<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Vishal<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Vishal Saraswat<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/algorithms<\/a>> # Algorithms<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Algorithms<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/computers_cryptography<\/a>> # COMPUTERS--Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/cryptography_mathematics<\/a>> # Cryptography--Mathematics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography--Mathematics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/mathematics_combinatorics<\/a>> # MATHEMATICS--Combinatorics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"MATHEMATICS--Combinatorics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/number_theory<\/a>> # Number theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Number theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/science_system_theory<\/a>> # SCIENCE--System Theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"SCIENCE--System Theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5447213839#Topic\/technology_&_engineering_operations_research<\/a>> # TECHNOLOGY & ENGINEERING--Operations Research<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"TECHNOLOGY & ENGINEERING--Operations Research<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"flu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781315114590<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1315114593<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781315114590<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351628129<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351628127<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351628129<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351628136<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351628135<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351628136<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351628150<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351628151<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351628150<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/1025358432<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Introduction to cryptography.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1053888392<\/a>> ; # Introduction to cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n