語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Group theoretic cryptography /
~
González Vasco, Maria Isabel.
Group theoretic cryptography /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Group theoretic cryptography /María Isabel González Vasco, Rainer Steinwandt.
作者:
González Vasco, Maria Isabel.
其他作者:
Steinwandt, Rainer.
出版者:
Boca Raton, FL :CRC Press,c2015.
面頁冊數:
xvii, 230 p. :ill. ;24 cm.
標題:
Cryptography.
ISBN:
9781584888369 (hbk.) :
Group theoretic cryptography /
González Vasco, Maria Isabel.
Group theoretic cryptography /
María Isabel González Vasco, Rainer Steinwandt. - Boca Raton, FL :CRC Press,c2015. - xvii, 230 p. :ill. ;24 cm. - Chapman & Hall/CRC cryptography and network security. - Chapman & Hall/CRC cryptography and network security..
Includes bibliographical references and index.
Machine generated contents note: 1.Mathematical background -- 1.1.Algebraic structures in a nutshell -- 1.2.Finite groups -- 1.3.Summary and further reading -- 1.4.Exercises -- 2.Basics on complexity -- 2.1.Complexity classes -- 2.2.Asymptotic notation and examples -- 2.3.Summary and further reading -- 2.4.Exercises -- 3.Cryptology: An introduction -- 3.1.A short historical overview -- 3.1.1.Historical encryption schemes -- 3.1.2.Public-key cryptography -- 3.2.Modern cryptology -- 3.3.Summary and further reading -- 3.4.Exercises -- 4.Provable security guarantees -- 4.1.Public-key encryption revisited -- 4.2.Characterizing secure public-key encryption -- 4.3.One-way functions and random oracles -- 4.4.The general Bellare-Rogaway construction -- 4.5.IND-CCA security with an Abelian group: RSA-OAEP -- 4.6.One-way functions from non-Abelian groups? -- 4.7.Summary and further reading -- 4.8.Exercises -- 5.Public-key encryption in the standard model -- 5.1.The Cramer-Shoup encryption scheme from 1998 -- 5.2.Going beyond: Tools -- 5.2.1.Projective hash families -- 5.2.2.Subset membership problems -- 5.2.3.Hash proof systems -- 5.3.General Cramer-Shoup encryption scheme -- 5.4.A concrete instantiation -- 5.5.Projective hash families from (non-Abelian) groups -- 5.5.1.Group action systems -- 5.5.2.Group action projective hash families -- 5.6.Summary and further reading -- 5.7.Exercises -- 6.Public-key encryption using infinite groups -- 6.1.The word problem in finitely presented groups -- 6.1.1.The encryption scheme of Wagner and Magyarik -- 6.1.2.Polly Cracker -- 6.1.3.A successor of the Wagner-Magyarik scheme -- 6.2.Using a group that is not finitely presentable? -- 6.3.Braid groups in cryptography -- 6.3.1.Basics on braid groups -- 6.3.2.Some computational problems in the braid group By -- 6.4.Summary and further reading -- 6.5.Exercises -- 7.Block ciphers -- 7.1.Advanced Encryption Standard -- 7.1.1.Specifying the round function -- 7.1.2.Key schedule -- 7.1.3.Encryption and decryption with AES -- 7.2.Data Encryption Standard -- 7.2.1.General structure of DES: A Feistel cipher -- 7.2.2.Round function of DES -- 7.2.3.Key schedule -- 7.3.Permutation Group Mappings -- 7.4.Modes of operation -- 7.4.1.Electronic codebook (ECB) mode -- 7.4.2.Cipher block chaining (CBC) mode -- 7.4.3.Cipher feedback (CFB) mode -- 7.4.4.Output feedback (OFB) mode -- 7.4.5.Counter (CTR) mode -- 7.5.Summary and further reading -- 7.6.Exercises -- 8.Cryptographic hash functions and message authentication codes -- 8.1.Cryptographic hash functions -- 8.2.Deriving a hash function from a block cipher -- 8.3.Cayley hash functions -- 8.4.Message authentication codes -- 8.4.1.Keyed-Hash Message Authentication Code -- 8.4.2.Cipher-based Message Authentication Code -- 8.5.Summary and further reading -- 8.6.Exercises -- 9.Key establishment protocols -- 9.1.Setting the stage -- 9.1.1.Provable security for key exchange protocols -- 9.1.2.A secure construction -- 9.2.Anshel-Anshel-Goldfeld key exchange -- 9.3.Braid-based key exchange -- 9.4.Constructions over matrix groups -- 9.5.Summary and further reading -- 9.6.Exercises -- 10.Signature and identification schemes -- 10.1.Definitions and terminology -- 10.2.RSA signatures: FDH and PSS -- 10.3.Identification schemes -- 10.4.Summary and further reading -- 10.5.Exercises -- A.Solutions to selected exercises -- A.1.Solutions to selected exercises of Part I -- A.2.Solutions to selected exercises of Part II -- A.3.Solutions to selected exercises of Part III -- A.4.Solutions to selected exercises of Part IV.
ISBN: 9781584888369 (hbk.) :NT$2494Subjects--Topical Terms:
189522
Cryptography.
LC Class. No.: QA76.9.A25 / G66 2015
Dewey Class. No.: 005.8
Group theoretic cryptography /
LDR
:04319nam a2200229 a 4500
001
457891
003
OCoLC
005
20150602025310.0
008
150922s2015 flua b 001 0 eng d
020
$a
9781584888369 (hbk.) :
$c
NT$2494
020
$a
1584888369 (hbk.)
020
$z
9781584888376 (ebk.)
035
$a
(OCoLC)907678277
035
$a
907678277
040
$a
NRC
$c
NRC
$d
UtOrBLW
$d
NhCcYME
050
4
$a
QA76.9.A25
$b
G66 2015
082
0 4
$a
005.8
$2
23
100
1
$a
González Vasco, Maria Isabel.
$3
709055
245
1 0
$a
Group theoretic cryptography /
$c
María Isabel González Vasco, Rainer Steinwandt.
260
$a
Boca Raton, FL :
$b
CRC Press,
$c
c2015.
300
$a
xvii, 230 p. :
$b
ill. ;
$c
24 cm.
490
1
$a
Chapman & Hall/CRC cryptography and network security
504
$a
Includes bibliographical references and index.
505
0
$a
Machine generated contents note: 1.Mathematical background -- 1.1.Algebraic structures in a nutshell -- 1.2.Finite groups -- 1.3.Summary and further reading -- 1.4.Exercises -- 2.Basics on complexity -- 2.1.Complexity classes -- 2.2.Asymptotic notation and examples -- 2.3.Summary and further reading -- 2.4.Exercises -- 3.Cryptology: An introduction -- 3.1.A short historical overview -- 3.1.1.Historical encryption schemes -- 3.1.2.Public-key cryptography -- 3.2.Modern cryptology -- 3.3.Summary and further reading -- 3.4.Exercises -- 4.Provable security guarantees -- 4.1.Public-key encryption revisited -- 4.2.Characterizing secure public-key encryption -- 4.3.One-way functions and random oracles -- 4.4.The general Bellare-Rogaway construction -- 4.5.IND-CCA security with an Abelian group: RSA-OAEP -- 4.6.One-way functions from non-Abelian groups? -- 4.7.Summary and further reading -- 4.8.Exercises -- 5.Public-key encryption in the standard model -- 5.1.The Cramer-Shoup encryption scheme from 1998 -- 5.2.Going beyond: Tools -- 5.2.1.Projective hash families -- 5.2.2.Subset membership problems -- 5.2.3.Hash proof systems -- 5.3.General Cramer-Shoup encryption scheme -- 5.4.A concrete instantiation -- 5.5.Projective hash families from (non-Abelian) groups -- 5.5.1.Group action systems -- 5.5.2.Group action projective hash families -- 5.6.Summary and further reading -- 5.7.Exercises -- 6.Public-key encryption using infinite groups -- 6.1.The word problem in finitely presented groups -- 6.1.1.The encryption scheme of Wagner and Magyarik -- 6.1.2.Polly Cracker -- 6.1.3.A successor of the Wagner-Magyarik scheme -- 6.2.Using a group that is not finitely presentable? -- 6.3.Braid groups in cryptography -- 6.3.1.Basics on braid groups -- 6.3.2.Some computational problems in the braid group By -- 6.4.Summary and further reading -- 6.5.Exercises -- 7.Block ciphers -- 7.1.Advanced Encryption Standard -- 7.1.1.Specifying the round function -- 7.1.2.Key schedule -- 7.1.3.Encryption and decryption with AES -- 7.2.Data Encryption Standard -- 7.2.1.General structure of DES: A Feistel cipher -- 7.2.2.Round function of DES -- 7.2.3.Key schedule -- 7.3.Permutation Group Mappings -- 7.4.Modes of operation -- 7.4.1.Electronic codebook (ECB) mode -- 7.4.2.Cipher block chaining (CBC) mode -- 7.4.3.Cipher feedback (CFB) mode -- 7.4.4.Output feedback (OFB) mode -- 7.4.5.Counter (CTR) mode -- 7.5.Summary and further reading -- 7.6.Exercises -- 8.Cryptographic hash functions and message authentication codes -- 8.1.Cryptographic hash functions -- 8.2.Deriving a hash function from a block cipher -- 8.3.Cayley hash functions -- 8.4.Message authentication codes -- 8.4.1.Keyed-Hash Message Authentication Code -- 8.4.2.Cipher-based Message Authentication Code -- 8.5.Summary and further reading -- 8.6.Exercises -- 9.Key establishment protocols -- 9.1.Setting the stage -- 9.1.1.Provable security for key exchange protocols -- 9.1.2.A secure construction -- 9.2.Anshel-Anshel-Goldfeld key exchange -- 9.3.Braid-based key exchange -- 9.4.Constructions over matrix groups -- 9.5.Summary and further reading -- 9.6.Exercises -- 10.Signature and identification schemes -- 10.1.Definitions and terminology -- 10.2.RSA signatures: FDH and PSS -- 10.3.Identification schemes -- 10.4.Summary and further reading -- 10.5.Exercises -- A.Solutions to selected exercises -- A.1.Solutions to selected exercises of Part I -- A.2.Solutions to selected exercises of Part II -- A.3.Solutions to selected exercises of Part III -- A.4.Solutions to selected exercises of Part IV.
650
0
$a
Cryptography.
$3
189522
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Computer networks
$x
Security measures.
$3
185597
700
1
$a
Steinwandt, Rainer.
$3
709056
830
0
$a
Chapman & Hall/CRC cryptography and network security.
$3
574812
筆 0 讀者評論
全部
西方語文圖書區(四樓)
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
320000659732
西方語文圖書區(四樓)
1圖書
一般圖書
QA76.9.A25 G643 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入