000 | 02031nam a22002537a 4500 | ||
---|---|---|---|
003 | AUA.1 | ||
005 | 20140304210230.0 | ||
008 | 140227t xxu||||| |||| 00| 0 eng d | ||
020 | _a0130669431 | ||
020 | _a9780130669438 | ||
040 | _cAUA | ||
050 |
_aQA76.9.A25 _bM36 2004 |
||
100 |
_aMao, Wenbo _941405 |
||
245 |
_aModern cryptography : _btheory and practice / _cWenbo Mao. |
||
260 |
_aUpper Saddle River, NJ : _bPrentice Hall PTR, _c©2004. |
||
300 |
_axxxviii, 707 p. : _bill. ; _c24 cm. |
||
490 | _aHewlett-Packard professional books. | ||
505 | _a pt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowledge protocols -- Returning to "coin flipping over telephone" -- Afterremark. | ||
650 |
_aCryptography. _941406 |
||
650 |
_aComputers _xAccess control. _941407 |
||
650 |
_aData transmission systems _xSecurity measures. _941408 |
||
942 |
_2lcc _cBOOK _hQA 76.9 .A25 _iM36 2004 |
||
999 |
_c11568 _d11568 |
||
952 |
_w2014-02-27 _pAUA014373 _v54.99 _r2014-02-27 _40 _00 _bAUA.1 _10 _oQA 76.9 .A25 M36 2004 _d2014-02-27 _8BKS _h14625 _70 _cGS _2lcc _g54.99 _yBOOK _aAUA.1 |