Lectures on Data Security: Modern Cryptology in Theory and Practice
โ Scribed by Mihir Bellare (auth.), Ivan Bjerre Damgรฅrd (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 1999
- Tongue
- English
- Leaves
- 255
- Series
- Lecture Notes in Computer Science 1561
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptololgy. In accordance with the educational objectives of the school, elementary introductions are provided to central topics, various examples are given of the problems encountered, and this is supplemented with solutions, open problems, and reference to further reading. The resulting book is ideally suited as an up-to-date introductory text for students and IT professionals interested in modern cryptology.
โฆ Table of Contents
Practice-Oriented Provable-Security....Pages 1-15
Introduction to Secure Computation....Pages 16-62
Commitment Schemes and Zero-Knowledge Protocols....Pages 63-86
Emerging Standards for Public-Key Cryptography....Pages 87-104
Contemporary Block Ciphers....Pages 105-126
Primality Tests and Use of Primes in Public Key Systems....Pages 127-133
Signing Contracts and Paying Electronically....Pages 134-157
The State of Cryptographic Hash Functions....Pages 158-182
The Search for the Holy Grail in Quantum Cryptography....Pages 183-216
Unconditional Security in Cryptography....Pages 217-250
โฆ Subjects
Data Encryption; Algorithm Analysis and Problem Complexity; Operating Systems; Computer Communication Networks; Algorithms; Discrete Mathematics in Computer Science
๐ SIMILAR VOLUMES
<span>In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of a series of summer schools organized by the European Edu- tional Forum, an organizationconsisting of the researchcenters TUCS (Finla
<span>This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 s
<p><span>The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. </span></p><p><span>The to
A hands-on, comprehensive guide, which gives students a practical insight into all aspects of web security and cryptography. ย