Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Asymmetric cryptography : primitives and protocols / coordinated by David Pointcheval. [O'Reilly electronic resource]

Publication Info. London, UK : ISTE, Ltd. ; Hoboken, NJ : John Wiley & Sons, Inc., 2022.
QR Code
Description 1 online resource.
Series Sciences. Computer science. Cryptography, data security
Sciences (Editions Eshel). Computer science: Cryptography, data security.
Contents Front Matter -- Public-Key Encryption and Security Notions / Nuttapong ATTRAPADUNG, Takahiro MATSUDA -- Signatures and Security Notions / Marc FISCHLIN -- Zero-Knowledge Proofs / Ivan VISCONTI -- Secure Multiparty Computation / Yehuda LINDELL -- Pairing-Based Cryptography / Olivier BLAZY -- Broadcast Encryption and Traitor Tracing / Duong HIEU PHAN -- Attribute-Based Encryption / Romain GAY -- Advanced Signatures / Olivier SANDERS -- Key Exchange / Colin BOYD -- Password Authenticated Key Exchange / Stanislaw JARECKI -- Verifiable Computation and Succinct Arguments for NP / Dario FIORE -- List of Authors -- Index
Bibliography Includes bibliographical references and index.
Summary Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.
Subject Cryptography.
Data encryption (Computer science)
Cryptographie.
Chiffrement (Informatique)
Cryptography
Data encryption (Computer science)
Added Author Pointcheval, David, editor.
ISBN 9781394188369 electronic book
1394188366 electronic book
9781394188345 electronic book
139418834X electronic book
hardcover
Standard No. 10.1002/9781394188369 doi
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information