江汉大学图书馆书目检索系统

| 暂存书架(0) | 登录



MARC状态:审校  文献类型:西文图书 浏览次数:32 

题名/责任者:
Asymmetric cryptography : primitives and protocols / coordinated by David Pointcheval.
出版发行项:
London, UK : ISTE, Ltd. ; Hoboken, NJ : John Wiley & Sons, Inc., 2022.
ISBN:
9781789450965
ISBN:
1789450969
载体形态项:
xii, 286 pages ; 25 cm.
丛编说明:
Sciences. Computer science. Cryptography, data security
丛编统一题名:
Sciences. Computer science: Cryptography, data security.
附加个人名称:
Pointcheval, David, editor.
论题主题:
Cryptography.
论题主题:
Data encryption (Computer science)
中图法分类号:
TP309.7
书目附注:
Includes bibliographical references and index.
内容附注:
Front Matter -- Public-Key Encryption and Security Notions / Nuttapong ATTRAPADUNG, Takahiro MATSUDA -- Signatures and Security Notions / Marc FISCHLIN -- Zero-Knowledge Proofs / Ivan VISCONTI -- Secure Multiparty Computation / Yehuda LINDELL -- Pairing-Based Cryptography / Olivier BLAZY -- Broadcast Encryption and Traitor Tracing / Duong HIEU PHAN -- Attribute-Based Encryption / Romain GAY -- Advanced Signatures / Olivier SANDERS -- Key Exchange / Colin BOYD -- Password Authenticated Key Exchange / Stanislaw JARECKI -- Verifiable Computation and Succinct Arguments for NP / Dario FIORE -- List of Authors -- Index
摘要附注:
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.
全部MARC细节信息>>
索书号 条码号 年卷期 馆藏地 定位信息 书刊状态 还书位置
TP309.7/A861 W0083088   外文图书样本库(401室)     导航 可借 外文图书样本库(401室)
显示全部馆藏信息
借阅趋势

您可能感兴趣的图书(点击查看)
同名作者的其他著作(点击查看)
用户名:
密码:
验证码:
请输入下面显示的内容
  证件号 条码号 Email
 
姓名:
手机号:
送 书 地:
收藏到: 管理书架