000 nam a22 7a 4500
999 _c28950
_d28950
008 180510b xxu||||| |||| 00| 0 eng d
020 _a9783319355009
082 _a005.82
_bRAM
100 _aRamkumar, Mahalingam
245 _aSymmetric cryptographic protocols
260 _bSpringer,
_c2014
_aSwitzerland:
300 _axvi, 234 p.
_bill.
_c24 cm.
365 _aEURO
_b102.79, Rs. 6654.92
520 _a This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees. - Provides detailed coverage of symmetric key protocols - Describes various applications of symmetric building blocks - Includes strategies for constructing compact and efficient digests of dynamic databases.
650 _aData structures
650 _aElectrical engineering
650 _aCommunications Engineering
650 _aCryptology
650 _aInformation Theory
650 _aData encryption
650 _aInternet Security Protocols
942 _2ddc
_cBK