000 02031nam a22002537a 4500
003 AUA.1
005 20140304210230.0
008 140227t xxu||||| |||| 00| 0 eng d
020 _a0130669431
020 _a9780130669438
040 _cAUA
050 _aQA76.9.A25
_bM36 2004
100 _aMao, Wenbo
_941405
245 _aModern cryptography :
_btheory and practice /
_cWenbo Mao.
260 _aUpper Saddle River, NJ :
_bPrentice Hall PTR,
_c©2004.
300 _axxxviii, 707 p. :
_bill. ;
_c24 cm.
490 _aHewlett-Packard professional books.
505 _a pt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowledge protocols -- Returning to "coin flipping over telephone" -- Afterremark.
650 _aCryptography.
_941406
650 _aComputers
_xAccess control.
_941407
650 _aData transmission systems
_xSecurity measures.
_941408
942 _2lcc
_cBOOK
_hQA 76.9 .A25
_iM36 2004
999 _c11568
_d11568
952 _w2014-02-27
_pAUA014373
_v54.99
_r2014-02-27
_40
_00
_bAUA.1
_10
_oQA 76.9 .A25 M36 2004
_d2014-02-27
_8BKS
_h14625
_70
_cGS
_2lcc
_g54.99
_yBOOK
_aAUA.1