
Asymmetric Cryptography Primitives and Protocols
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical......
fra 1 899,-
Tilgjengelig i 1 butikker
Forhåndsbestill
Frakt og levering
Produktinformasjon
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography.It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes.Finally, it details the more recent topic of verifiable computation.
Topplisten: Other Brand Data og informasjonsteknologi
Spesifikasjon
Produkt
| Produktnavn | Asymmetric Cryptography Primitives and Protocols |
| Merke | Other Brand |
Pris og prishistorikk
Akkurat nå er 1 899,- den billigste prisen for Asymmetric Cryptography Primitives and Protocols blant 1 butikker hos Prisradar. Sjekk også vår topp 5-rangering av beste data og informasjonsteknologi for å være sikker på at du gjør det beste kjøpet.
This is For EveryonemacOS Mojave in easy stepsMicrosoft Azure StorageDetecting Troubleshooting and Preventing Congestion in Storage Networks
R Programming for Data ScienceIntroduction to Artificial Intelligence: A Business PerspectmacOS High Sierra For DummiesUsing Artificial Intelligence Absolute Beginner¿s Guide
If ThenQuantum Machine LearningCross-Industry Use of Blockchain Technology and Opportunities for the FutureProc Report by Example









