Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1019
Title: | Introduction to Security Reduction |
Authors: | Guo, Fuchun. ;;Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;;Mu, Yi. ; |
subject: | Computer Science;Computer Security;Data structures (Computer science). ;;Computer Science;Data Structures, Cryptology and Information Theory. ;;Systems and Data Security;Security. ;;QA76.9.D35 ; |
Year: | 2018 |
place: | Cham : |
Publisher: | Springer International Publishing : Imprint: Springer, |
Abstract: | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; |
Description: | 005.74 ; 23 ; Printed edition: ; 9783319930480. ; SpringerLink (Online service) ; |
URI: | http://localhost/handle/Hannan/1019 |
ISBN: | 9783319930497 ; 9783319930480 (print) ; |
More Information: | XV, 253 p. ; online resource. ; |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319930480.pdf | 2.3 MB | Adobe PDF | Preview File |
Title: | Introduction to Security Reduction |
Authors: | Guo, Fuchun. ;;Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;;Mu, Yi. ; |
subject: | Computer Science;Computer Security;Data structures (Computer science). ;;Computer Science;Data Structures, Cryptology and Information Theory. ;;Systems and Data Security;Security. ;;QA76.9.D35 ; |
Year: | 2018 |
place: | Cham : |
Publisher: | Springer International Publishing : Imprint: Springer, |
Abstract: | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; |
Description: | 005.74 ; 23 ; Printed edition: ; 9783319930480. ; SpringerLink (Online service) ; |
URI: | http://localhost/handle/Hannan/1019 |
ISBN: | 9783319930497 ; 9783319930480 (print) ; |
More Information: | XV, 253 p. ; online resource. ; |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319930480.pdf | 2.3 MB | Adobe PDF | Preview File |
Title: | Introduction to Security Reduction |
Authors: | Guo, Fuchun. ;;Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;;Mu, Yi. ; |
subject: | Computer Science;Computer Security;Data structures (Computer science). ;;Computer Science;Data Structures, Cryptology and Information Theory. ;;Systems and Data Security;Security. ;;QA76.9.D35 ; |
Year: | 2018 |
place: | Cham : |
Publisher: | Springer International Publishing : Imprint: Springer, |
Abstract: | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; |
Description: | 005.74 ; 23 ; Printed edition: ; 9783319930480. ; SpringerLink (Online service) ; |
URI: | http://localhost/handle/Hannan/1019 |
ISBN: | 9783319930497 ; 9783319930480 (print) ; |
More Information: | XV, 253 p. ; online resource. ; |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319930480.pdf | 2.3 MB | Adobe PDF | Preview File |