Cargando…

Symmetric Cryptographic Protocols

This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ramkumar, Mahalingam (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Introduction
  • Some Useful Constructions
  • Non-scalable Key Distribution Schemes
  • MLS for Internet Security Protocols
  • Scalable Key Distribution Schemes
  • Scalable Extensions of Non-scalable Schemes
  • Using PKPSs With Tamper-Responsive Modules
  • Broadcast Authentication and Broadcast Encryption
  • Authenticated Data Structures
  • Universal Trusted Computing Bases
  • Conclusions and References.