Asymmetric cryptography : primitives and protocols / coordinated by David Pointcheval.
Contributor(s): Pointcheval, David [editor.]
Language: English Series: SciencesComputer science: Cryptography, data security: Publisher: London, UK : Hoboken, NJ : ISTE, Ltd. ; John Wiley & Sons, Inc., 2022Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781789450965 ; 9781394188369; 1394188366; 9781394188345; 139418834XSubject(s): Cryptography | Data encryption (Computer science)Genre/Form: Electronic books.DDC classification: 005.824 LOC classification: QA76.9.A25 | A83 2022Online resources: Full text is available at Wiley Online Library Click here to view. Summary: Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.| Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|
EBOOK
|
COLLEGE LIBRARY | COLLEGE LIBRARY | 005.824 As99 2022 (Browse shelf) | Available |
Browsing COLLEGE LIBRARY Shelves Close shelf browser
|
|
|
|
|
|
|
||
| 005.822 C11 2007 Simple computer security : disinfect your PC / | 005.822 Ea79 2006 Computer security fundamentals / | 005.822 St83 2004 Network security foundations / | 005.824 As99 2022 Asymmetric cryptography : primitives and protocols / | 005.824 G8821 2020 Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / | 005.824 M3111 2024 Cryptography : algorithms, protocols, and standards for computer security / | 005.824 M3111 2024 Cryptography : algorithms, protocols, and standards for computer security / |
Includes bibliographical references and index.
Available to OhioLINK libraries.
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.
About the Author
David Pointcheval obtained a PhD in Computer Science and has since worked on the Cryptography Team at the École Normale Supérieure in France. His research focuses on provable security of cryptographic primitives and protocols.

EBOOK
There are no comments for this item.