<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01250    a2200253   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20240613125142.0</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">1-58488-508-4 (Hardcover)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">978-1-58488-508-5 (Hardcover)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
    <subfield code="a">005.82,STI</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Stinson, Douglas R.</subfield>
    <subfield code="9">8890</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
    <subfield code="a">Cryptography: theory and practice /</subfield>
    <subfield code="c">Douglas R. Stinson</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
    <subfield code="a">3rd ed.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boca Raton :</subfield>
    <subfield code="b">Chapman &amp; Hall/CRC,</subfield>
    <subfield code="c">cop. 2006</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">593 s. :</subfield>
    <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="440" ind1=" " ind2="4">
    <subfield code="a">The CRC Press series on discrete mathematics and its applications,</subfield>
    <subfield code="9">100979</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Classical Cryptography (Page-1), Shannon&#x2019;s Cryptography (Page-45), Cryptographic Hash functions (Page-119), The RSA Cryptosystem and Factoring Integers (Page-161), Public &#x2013;key cryptography and discrete logarithms (Page-233), Signatures schemes (Page-281), Identification schemes and entity authentication (Page-353), Key Distribution (Page-393), Key agreement scheme (Page-429), Public key Infrastructure (Page-457), Secret Sharing Schemes (Page-481), Multicast security and copyright protection (Page-457).</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Coding theory</subfield>
    <subfield code="9">3106</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Cryptography</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Cryptography</subfield>
    <subfield code="9">123627</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Kryptering</subfield>
    <subfield code="9">100880</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">REF</subfield>
    <subfield code="2">ddc</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">197417</subfield>
    <subfield code="d">197417</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">REF</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="o">005.82,STI</subfield>
    <subfield code="p">MCS36802</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">REF</subfield>
    <subfield code="z">Almirah No.18, Shelf No.4</subfield>
  </datafield>
</record>
