000 | a | ||
---|---|---|---|
999 |
_c33015 _d33015 |
||
008 | 240408b xxu||||| |||| 00| 0 eng d | ||
020 |
_a9781789450965 _chbk |
||
082 |
_a005.82 _bPOI |
||
100 |
_aPointcheval, David _eed. |
||
245 | _aAsymmetric cryptography : primitives and protocols | ||
260 |
_bISTE Ltd, _c2022 _aLondon : |
||
300 |
_axii,286 p. ; _bill., _c25 cm |
||
365 |
_b164.95 _c$ _d86.30 |
||
490 | _aSciences. Computer science. Cryptography, data security | ||
504 | _aIncludes index. | ||
520 | _aPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves .Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. | ||
650 | _aVerifiable computation | ||
650 | _aMulti-recipient encryption schemes | ||
650 | _aAnonymous signatures | ||
650 | _aAdvanced cryptographic schemes | ||
650 | _aEncryption | ||
650 | _aCiphertext | ||
942 |
_2ddc _cBK |