Modern Cryptography with Proof Techniques and Implementations
-10%
portes grátis
Modern Cryptography with Proof Techniques and Implementations
Kim, Intae; Oun Hwang, Seong; Lee, Wai Kong
Taylor & Francis Ltd
03/2021
510
Dura
Inglês
9781138584082
15 a 20 dias
848
Descrição não disponível.
Part 1: Foundations of Cryptography.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
PPT;Cybersecurity;Probabilistic Polynomial Time Adversaries;Machine learning;IBE;Private-key encryption;Probabilistic Polynomial Time Algorithm;Predicate encryption;Random Oracle;Modern cryptography;Challenge Ciphertext;Private Key;Random Oracle Model;Chosen Ciphertext Attacks;Message Authentication Code;Chosen Plaintext Attacks;Polynomial Time Adversaries;Decryption Oracle;IBE Scheme;Secret Key;Goppa Code;Hash Function;Block Cipher;Parity Check Matrix;Identity Id;Cryptographic Hash Function;PKE Scheme;Master Secret Key;Pseudorandom Function;Linear Code
Part 1: Foundations of Cryptography.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
PPT;Cybersecurity;Probabilistic Polynomial Time Adversaries;Machine learning;IBE;Private-key encryption;Probabilistic Polynomial Time Algorithm;Predicate encryption;Random Oracle;Modern cryptography;Challenge Ciphertext;Private Key;Random Oracle Model;Chosen Ciphertext Attacks;Message Authentication Code;Chosen Plaintext Attacks;Polynomial Time Adversaries;Decryption Oracle;IBE Scheme;Secret Key;Goppa Code;Hash Function;Block Cipher;Parity Check Matrix;Identity Id;Cryptographic Hash Function;PKE Scheme;Master Secret Key;Pseudorandom Function;Linear Code