Modern cryptography :
Mao, Wenbo
Modern cryptography : theory and practice / Wenbo Mao. - Upper Saddle River, NJ : Prentice Hall PTR, ©2004. - xxxviii, 707 p. : ill. ; 24 cm. - Hewlett-Packard professional books. .
pt. 1. Introduction. Beginning with a simple communication game --
Wrestling between safeguard and attack --
pt. 2. Mathematical foundations. Probability and information theory --
Computational complexity --
Algebraic foundations --
Number theory --
pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques --
Encryption: asymmetric techniques --
In an ideal world: bit security of the basic public-key cryptographic functions --
Data integrity techniques --
pt. 4. Authentication. Authentication protocols: principles --
Authentication protocols: the real world --
Authentication framework for public-key cryptography --
pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems --
Provably secure and efficient public-key cryptosystems --
Strong and provable security for digital signatures --
Formal methods for authentication protocols analysis --
pt. 6. Cryptographic protocols. Zero-knowledge protocols --
Returning to "coin flipping over telephone" --
Afterremark.
0130669431 9780130669438
Cryptography.
Computers--Access control.
Data transmission systems--Security measures.
QA76.9.A25 / M36 2004
Modern cryptography : theory and practice / Wenbo Mao. - Upper Saddle River, NJ : Prentice Hall PTR, ©2004. - xxxviii, 707 p. : ill. ; 24 cm. - Hewlett-Packard professional books. .
pt. 1. Introduction. Beginning with a simple communication game --
Wrestling between safeguard and attack --
pt. 2. Mathematical foundations. Probability and information theory --
Computational complexity --
Algebraic foundations --
Number theory --
pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques --
Encryption: asymmetric techniques --
In an ideal world: bit security of the basic public-key cryptographic functions --
Data integrity techniques --
pt. 4. Authentication. Authentication protocols: principles --
Authentication protocols: the real world --
Authentication framework for public-key cryptography --
pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems --
Provably secure and efficient public-key cryptosystems --
Strong and provable security for digital signatures --
Formal methods for authentication protocols analysis --
pt. 6. Cryptographic protocols. Zero-knowledge protocols --
Returning to "coin flipping over telephone" --
Afterremark.
0130669431 9780130669438
Cryptography.
Computers--Access control.
Data transmission systems--Security measures.
QA76.9.A25 / M36 2004