TY - BOOK AU - Mao, Wenbo TI - Modern cryptography: theory and practice T2 - Hewlett-Packard professional books SN - 0130669431 AV - QA76.9.A25 M36 2004 PY - 2004/// CY - Upper Saddle River, NJ PB - Prentice Hall PTR KW - Cryptography. KW - Computers KW - Access control KW - Data transmission systems KW - Security measures N1 - pt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowledge protocols -- Returning to "coin flipping over telephone" -- Afterremark ER -