Modern Cryptography with Proof Techniques and Implementations

Modern Cryptography with Proof Techniques and Implementations

Kim, Intae; Oun Hwang, Seong; Lee, Wai Kong

Taylor & Francis Ltd

03/2021

510

Dura

Inglês

9781138584082

15 a 20 dias

848

Descrição não disponível.
Part 1: Foundations of Cryptography.

1. History of Cryptography.

2. Overview of Provable Security.

3. Private Key Encryption.

4. Message Authentication Code.

5. Hash Function.

6. Public Key Cryptography.

7. Digital Signature.

8. Protocols.

Part 2: Fundamentals of IBE.

9. First Provable IBE (Boneh-Franklin).

10. Selective Security IBE (Boneh-Boyen).

11. Tight Security IBE (Gentry IBE).

12. Dual System Encryption (Waters).

13. Hierarchical IBE (Allison-Waters).

14. Broadcast Encryption.

15. Identity Based Signature.

16. Transformation Techniques.

Part 3: Advanced IBE.

17. Key Policy-Attribute Based Encryption.

18. Ciphertext Policy-Attribute Based Encryption.

19. Predicate Encryption.

20. Functional Encryption.

21. Searchable Encryption.

Part 4: Future Cryptography.

22. Certificate Based Cryptography.

23. Certificate-Less Cryptography.

24. Homomorphic Encryption.

25. Post Quantum Cryptography.

26. Blockchain Applications.
PPT;Cybersecurity;Probabilistic Polynomial Time Adversaries;Machine learning;IBE;Private-key encryption;Probabilistic Polynomial Time Algorithm;Predicate encryption;Random Oracle;Modern cryptography;Challenge Ciphertext;Private Key;Random Oracle Model;Chosen Ciphertext Attacks;Message Authentication Code;Chosen Plaintext Attacks;Polynomial Time Adversaries;Decryption Oracle;IBE Scheme;Secret Key;Goppa Code;Hash Function;Block Cipher;Parity Check Matrix;Identity Id;Cryptographic Hash Function;PKE Scheme;Master Secret Key;Pseudorandom Function;Linear Code