Protecting information : (Record no. 268)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090323s2006 enka b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2006002404
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 052182740X
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u1237
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.1
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Loepp, Susan.
9 (RLIN) 963
245 10 - TITLE STATEMENT
Title Protecting information :
Remainder of title from classical error correction to quantum cryptography /
Statement of responsibility, etc. Susan Loepp, William K. Wootters.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cambridge ;
-- New York :
Name of publisher, distributor, etc. Cambridge University Press,
Date of publication, distribution, etc. 2006.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 287 p. :
Other physical details ill. ;
Dimensions 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 277-284) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Cryptography: an overview; 2. Quantum mechanics; 3. Quantum cryptography; 4. An introduction to error-correcting codes; 5. Quantum cryptography revisited; 6. Generalized Reed-Solomon codes; 7. Quantum computing; Appendi
520 ## - SUMMARY, ETC.
Summary, etc. For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the potential impacts of quantum physics: (i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices.
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Quantum computers.
9 (RLIN) 503
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 964
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wootters, William Kent.
9 (RLIN) 965
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   004.1 / LO.P 2006 002560 11/24/2019 1 11/24/2019 Books