Normal view MARC view ISBD view

Asymmetric cryptography : primitives and protocols

By: Pointcheval, David [ed.].
Series: Sciences. Computer science. Cryptography, data security.Publisher: London : ISTE Ltd, 2022Description: xii,286 p. ; ill., 25 cm.ISBN: 9781789450965.Subject(s): Verifiable computation | Multi-recipient encryption schemes | Anonymous signatures | Advanced cryptographic schemes | Encryption | CiphertextDDC classification: 005.82 Summary: Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves .Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Books 005.82 POI (Browse shelf) Available 034970

Includes index.

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves .Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha