Introduction to Security Reduction
Autor Fuchun Guo, Willy Susilo, Yi Muen Limba Engleză Paperback – 29 ian 2019
This book is suitable for researchers and graduate students engaged with public-key cryptography.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 1002.26 lei 6-8 săpt. | |
| Springer International Publishing – 29 ian 2019 | 1002.26 lei 6-8 săpt. | |
| Hardback (1) | 1008.26 lei 6-8 săpt. | |
| Springer International Publishing – 8 iul 2018 | 1008.26 lei 6-8 săpt. |
Preț: 1002.26 lei
Preț vechi: 1252.82 lei
-20% Nou
Puncte Express: 1503
Preț estimativ în valută:
177.36€ • 206.83$ • 155.72£
177.36€ • 206.83$ • 155.72£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030065744
ISBN-10: 303006574X
Pagini: 253
Ilustrații: XV, 253 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.39 kg
Ediția:Softcover reprint of the original 1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 303006574X
Pagini: 253
Ilustrații: XV, 253 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.39 kg
Ediția:Softcover reprint of the original 1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Notions, Definitions and Models.- Identity-Based Encryption.- Foundations of Group-Based Cryptography.- Foundations of Security Reduction.- Digital Signatures With Random Oracles.- Digital Signatures Without Random Oracles.- Public Key Encryption With Random Oracles.- Public Key Encryption Without Random Oracles.- Identity-Based Encryption With Random Oracles.- Identity-Based Encryption Without Random Oracles.
Textul de pe ultima copertă
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions.
This book is suitable for researchers and graduate students engaged with public-key cryptography.
This book is suitable for researchers and graduate students engaged with public-key cryptography.
Caracteristici
Security proofs are essential to public-key cryptography
Illustrates important notions in security reductions
Suitable for researchers and graduate students engaged with public-key cryptography
Illustrates important notions in security reductions
Suitable for researchers and graduate students engaged with public-key cryptography