Cargando…

Asymmetric cryptography : primitives and protocols /

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been develo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Pointcheval, David (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London, UK : Hoboken, NJ : ISTE, Ltd. ; John Wiley & Sons, Inc., 2022.
Colección:Sciences (Editions Eshel). Computer science: Cryptography, data security.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1356854113
003 OCoLC
005 20231017213018.0
006 m o d
007 cr un|---aucuu
008 230104s2022 enk ob 001 0 eng d
040 |a DG1  |b eng  |e rda  |e pn  |c DG1  |d YDX  |d ORMDA  |d OCLCF  |d LANGC  |d OCLCQ  |d OCLCO 
019 |a 1371441714 
020 |a 9781394188369  |q electronic book 
020 |a 1394188366  |q electronic book 
020 |a 9781394188345  |q electronic book 
020 |a 139418834X  |q electronic book 
020 |z 9781789450965  |q hardcover 
024 7 |a 10.1002/9781394188369  |2 doi 
029 1 |a AU@  |b 000073230711 
035 |a (OCoLC)1356854113  |z (OCoLC)1371441714 
037 |a 9781789450965  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b A83 2022 
082 0 4 |a 005.8/24 
049 |a UAMI 
245 0 0 |a Asymmetric cryptography :  |b primitives and protocols /  |c coordinated by David Pointcheval. 
264 1 |a London, UK :  |b ISTE, Ltd. ;  |a Hoboken, NJ :  |b John Wiley & Sons, Inc.,  |c 2022. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Sciences. Computer science. Cryptography, data security 
505 0 |a Front Matter -- Public-Key Encryption and Security Notions / Nuttapong ATTRAPADUNG, Takahiro MATSUDA -- Signatures and Security Notions / Marc FISCHLIN -- Zero-Knowledge Proofs / Ivan VISCONTI -- Secure Multiparty Computation / Yehuda LINDELL -- Pairing-Based Cryptography / Olivier BLAZY -- Broadcast Encryption and Traitor Tracing / Duong HIEU PHAN -- Attribute-Based Encryption / Romain GAY -- Advanced Signatures / Olivier SANDERS -- Key Exchange / Colin BOYD -- Password Authenticated Key Exchange / Stanislaw JARECKI -- Verifiable Computation and Succinct Arguments for NP / Dario FIORE -- List of Authors -- Index 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (John Wiley, viewed January 4, 2023). 
520 |a Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science) 
650 6 |a Cryptographie. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Cryptography  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
700 1 |a Pointcheval, David,  |e editor. 
830 0 |a Sciences (Editions Eshel).  |p Computer science: Cryptography, data security. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781789450965/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP