Cantitate/Preț
Produs

Introduction to Security Reduction

Autor Fuchun Guo, Willy Susilo, Yi Mu
en Limba Engleză Paperback – 29 ian 2019
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions.
This book is suitable for researchers and graduate students engaged with public-key cryptography.

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 104279 lei  6-8 săpt.
  Springer International Publishing – 29 ian 2019 104279 lei  6-8 săpt.
Hardback (1) 104904 lei  6-8 săpt.
  Springer International Publishing – 8 iul 2018 104904 lei  6-8 săpt.

Preț: 104279 lei

Preț vechi: 130348 lei
-20% Nou

Puncte Express: 1564

Preț estimativ în valută:
19959 20758$ 16726£

Carte tipărită la comandă

Livrare economică 14-28 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030065744
ISBN-10: 303006574X
Pagini: 253
Ilustrații: XV, 253 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.39 kg
Ediția:Softcover reprint of the original 1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland

Cuprins

Notions, Definitions and Models.- Identity-Based Encryption.- Foundations of Group-Based Cryptography.- Foundations of Security Reduction.- Digital Signatures With Random Oracles.- Digital Signatures Without Random Oracles.- Public Key Encryption With Random Oracles.- Public Key Encryption Without Random Oracles.- Identity-Based Encryption With Random Oracles.- Identity-Based Encryption Without Random Oracles.

Textul de pe ultima copertă

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions.
This book is suitable for researchers and graduate students engaged with public-key cryptography.

Caracteristici

Security proofs are essential to public-key cryptography
Illustrates important notions in security reductions
Suitable for researchers and graduate students engaged with public-key cryptography