Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | 005.82 POI (Browse shelf) | Available | 034970 |
005.82 PAN Information hiding and applications | 005.82 PAN Intelligent watermarking techniques | 005.82 PAT Information security : theory and practice | 005.82 POI Asymmetric cryptography : primitives and protocols | 005.82 RAM Symmetric cryptographic protocols | 005.82 RHE Internet security : cryptographic principles, algorithms, and protocols | 005.82 ROD Cryptographic algorithms on reconfigurable hardware |
Includes index.
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves .Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme.
There are no comments for this item.