Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1019
| Title: | Introduction to Security Reduction |
| Authors: | Guo, Fuchun. ;;Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;;Mu, Yi. ; |
| subject: | Computer Science;Computer Security;Data structures (Computer science). ;;Computer Science;Data Structures, Cryptology and Information Theory. ;;Systems and Data Security;Security. ;;QA76.9.D35 ; |
| Year: | 2018 |
| place: | Cham : |
| Publisher: | Springer International Publishing : Imprint: Springer, |
| Abstract: | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; |
| Description: | 005.74 ; 23 ; Printed edition: ; 9783319930480. ; SpringerLink (Online service) ; |
| URI: | http://localhost/handle/Hannan/1019 |
| ISBN: | 9783319930497 ; 9783319930480 (print) ; |
| More Information: | XV, 253 p. ; online resource. ; |
| Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 9783319930480.pdf | 2.3 MB | Adobe PDF | ![]() Preview File |
| Title: | Introduction to Security Reduction |
| Authors: | Guo, Fuchun. ;;Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;;Mu, Yi. ; |
| subject: | Computer Science;Computer Security;Data structures (Computer science). ;;Computer Science;Data Structures, Cryptology and Information Theory. ;;Systems and Data Security;Security. ;;QA76.9.D35 ; |
| Year: | 2018 |
| place: | Cham : |
| Publisher: | Springer International Publishing : Imprint: Springer, |
| Abstract: | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; |
| Description: | 005.74 ; 23 ; Printed edition: ; 9783319930480. ; SpringerLink (Online service) ; |
| URI: | http://localhost/handle/Hannan/1019 |
| ISBN: | 9783319930497 ; 9783319930480 (print) ; |
| More Information: | XV, 253 p. ; online resource. ; |
| Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 9783319930480.pdf | 2.3 MB | Adobe PDF | ![]() Preview File |
| Title: | Introduction to Security Reduction |
| Authors: | Guo, Fuchun. ;;Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;;Mu, Yi. ; |
| subject: | Computer Science;Computer Security;Data structures (Computer science). ;;Computer Science;Data Structures, Cryptology and Information Theory. ;;Systems and Data Security;Security. ;;QA76.9.D35 ; |
| Year: | 2018 |
| place: | Cham : |
| Publisher: | Springer International Publishing : Imprint: Springer, |
| Abstract: | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; |
| Description: | 005.74 ; 23 ; Printed edition: ; 9783319930480. ; SpringerLink (Online service) ; |
| URI: | http://localhost/handle/Hannan/1019 |
| ISBN: | 9783319930497 ; 9783319930480 (print) ; |
| More Information: | XV, 253 p. ; online resource. ; |
| Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 9783319930480.pdf | 2.3 MB | Adobe PDF | ![]() Preview File |
