Symmetric Cryptographic Protocols
This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Edición: | 1st ed. 2014. |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Introduction
- Some Useful Constructions
- Non-scalable Key Distribution Schemes
- MLS for Internet Security Protocols
- Scalable Key Distribution Schemes
- Scalable Extensions of Non-scalable Schemes
- Using PKPSs With Tamper-Responsive Modules
- Broadcast Authentication and Broadcast Encryption
- Authenticated Data Structures
- Universal Trusted Computing Bases
- Conclusions and References.