Markedets billigste bøger
Levering: 1 - 2 hverdage

Asymmetric Cryptography

Bag om Asymmetric Cryptography

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9781789450965
  • Indbinding:
  • Hardback
  • Sideantal:
  • 304
  • Udgivet:
  • 12. januar 2023
  • Størrelse:
  • 161x21x240 mm.
  • Vægt:
  • 619 g.
  Gratis fragt
Leveringstid: 2-3 uger
Forventet levering: 22. januar 2025
Forlænget returret til d. 31. januar 2025
  •  

    Kan ikke leveres inden jul.
    Køb nu og print et gavebevis

Beskrivelse af Asymmetric Cryptography

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.

Brugerbedømmelser af Asymmetric Cryptography



Find lignende bøger
Bogen Asymmetric Cryptography findes i følgende kategorier:

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.