Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1019
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guo, Fuchun. ; | en_US |
dc.contributor.author | Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ; | en_US |
dc.contributor.author | Mu, Yi. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:28Z | - |
dc.date.available | 2020-05-17T08:24:28Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319930497 ; | en_US |
dc.identifier.isbn | 9783319930480 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1019 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | Printed edition: ; 9783319930480. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; | en_US |
dc.description.statementofresponsibility | by Fuchun Guo, Willy Susilo, Yi Mu. | en_US |
dc.description.tableofcontents | Notions, Definitions and Models -- Identity-Based Encryption -- Foundations of Group-Based Cryptography -- Foundations of Security Reduction -- Digital Signatures With Random Oracles -- Digital Signatures Without Random Oracles -- Public Key Encryption With Random Oracles -- Public Key Encryption Without Random Oracles -- Identity-Based Encryption With Random Oracles -- Identity-Based Encryption Without Random Oracles. ; | en_US |
dc.format.extent | XV, 253 p. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319930480.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Security. ; | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Introduction to Security Reduction | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319930480.pdf | 2.3 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guo, Fuchun. ; | en_US |
dc.contributor.author | Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ; | en_US |
dc.contributor.author | Mu, Yi. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:28Z | - |
dc.date.available | 2020-05-17T08:24:28Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319930497 ; | en_US |
dc.identifier.isbn | 9783319930480 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1019 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | Printed edition: ; 9783319930480. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; | en_US |
dc.description.statementofresponsibility | by Fuchun Guo, Willy Susilo, Yi Mu. | en_US |
dc.description.tableofcontents | Notions, Definitions and Models -- Identity-Based Encryption -- Foundations of Group-Based Cryptography -- Foundations of Security Reduction -- Digital Signatures With Random Oracles -- Digital Signatures Without Random Oracles -- Public Key Encryption With Random Oracles -- Public Key Encryption Without Random Oracles -- Identity-Based Encryption With Random Oracles -- Identity-Based Encryption Without Random Oracles. ; | en_US |
dc.format.extent | XV, 253 p. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319930480.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Security. ; | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Introduction to Security Reduction | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319930480.pdf | 2.3 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guo, Fuchun. ; | en_US |
dc.contributor.author | Susilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ; | en_US |
dc.contributor.author | Mu, Yi. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:28Z | - |
dc.date.available | 2020-05-17T08:24:28Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319930497 ; | en_US |
dc.identifier.isbn | 9783319930480 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1019 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | Printed edition: ; 9783319930480. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ; | en_US |
dc.description.statementofresponsibility | by Fuchun Guo, Willy Susilo, Yi Mu. | en_US |
dc.description.tableofcontents | Notions, Definitions and Models -- Identity-Based Encryption -- Foundations of Group-Based Cryptography -- Foundations of Security Reduction -- Digital Signatures With Random Oracles -- Digital Signatures Without Random Oracles -- Public Key Encryption With Random Oracles -- Public Key Encryption Without Random Oracles -- Identity-Based Encryption With Random Oracles -- Identity-Based Encryption Without Random Oracles. ; | en_US |
dc.format.extent | XV, 253 p. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319930480.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Security. ; | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Introduction to Security Reduction | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319930480.pdf | 2.3 MB | Adobe PDF | Preview File |