Introduction to Modern Cryptography
-10%
portes grátis
Introduction to Modern Cryptography
Katz, Jonathan; Lindell, Yehuda
Taylor & Francis Inc
12/2020
648
Dura
Inglês
9780815354369
15 a 20 dias
1080
Descrição não disponível.
1. Introduction. 2. Perfectly Secret Encryption. 3. Private-Key Encryption. 4. Message Authentication Codes. 5. CCA-Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric-Key Primitives. 8. *Theoretical Constructions of Symmetric-Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public-Key Revolution. 12. Public-Key Encryption. 13. Digital Signature Schemes. 14. *Post-Quantum Cryptography. 15. *Advanced Topics in Public-Key Encryption.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
PPT Adversary;PPT Algorithm;Cryptography;Message Authentication Codes;Public Key Encryption Schemes;Block Cipher;Pseudorandom Function;Discrete Logarithm Problems;Hash Function;Encryption Scheme;Random Oracle Model;Pseudorandom Generator;Collision Resistant Hash Functions;Public Key Cryptography;Stream Ciphers;Pseudorandom Permutation;RSA;Private Key Cryptography;Chosen Plaintext Attack;Cryptology;Public Key Pk;Challenge Ciphertext;Key Length;Diffie Hellman Key Exchange Protocol;Feistel Network;RSA Problem;Digital Signature Scheme;Public Key;Perfect Secrecy;Post-quantum Cryptography;Private Key Crytography;Private-key encryption;Quantum computers;Modern cryptography;Elliptic-curve cryptography
1. Introduction. 2. Perfectly Secret Encryption. 3. Private-Key Encryption. 4. Message Authentication Codes. 5. CCA-Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric-Key Primitives. 8. *Theoretical Constructions of Symmetric-Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public-Key Revolution. 12. Public-Key Encryption. 13. Digital Signature Schemes. 14. *Post-Quantum Cryptography. 15. *Advanced Topics in Public-Key Encryption.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
PPT Adversary;PPT Algorithm;Cryptography;Message Authentication Codes;Public Key Encryption Schemes;Block Cipher;Pseudorandom Function;Discrete Logarithm Problems;Hash Function;Encryption Scheme;Random Oracle Model;Pseudorandom Generator;Collision Resistant Hash Functions;Public Key Cryptography;Stream Ciphers;Pseudorandom Permutation;RSA;Private Key Cryptography;Chosen Plaintext Attack;Cryptology;Public Key Pk;Challenge Ciphertext;Key Length;Diffie Hellman Key Exchange Protocol;Feistel Network;RSA Problem;Digital Signature Scheme;Public Key;Perfect Secrecy;Post-quantum Cryptography;Private Key Crytography;Private-key encryption;Quantum computers;Modern cryptography;Elliptic-curve cryptography