Loading…

Symmetric Cryptographic Protocols

This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Ramkumar, Mahalingam (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:Inglés
Published: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edition:1st ed. 2014.
Subjects:
Online Access:Texto Completo
Table of Contents:
  • Introduction
  • Some Useful Constructions
  • Non-scalable Key Distribution Schemes
  • MLS for Internet Security Protocols
  • Scalable Key Distribution Schemes
  • Scalable Extensions of Non-scalable Schemes
  • Using PKPSs With Tamper-Responsive Modules
  • Broadcast Authentication and Broadcast Encryption
  • Authenticated Data Structures
  • Universal Trusted Computing Bases
  • Conclusions and References.