Symmetric Cryptographic Protocols
This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Corporate Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Edition: | 1st ed. 2014. |
Subjects: | |
Online Access: | Texto Completo |
Table of Contents:
- Introduction
- Some Useful Constructions
- Non-scalable Key Distribution Schemes
- MLS for Internet Security Protocols
- Scalable Key Distribution Schemes
- Scalable Extensions of Non-scalable Schemes
- Using PKPSs With Tamper-Responsive Modules
- Broadcast Authentication and Broadcast Encryption
- Authenticated Data Structures
- Universal Trusted Computing Bases
- Conclusions and References.