Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1019
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuo, Fuchun. ;en_US
dc.contributor.authorSusilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;en_US
dc.contributor.authorMu, Yi. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:28Z-
dc.date.available2020-05-17T08:24:28Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319930497 ;en_US
dc.identifier.isbn9783319930480 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1019-
dc.descriptionen_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319930480. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ;en_US
dc.description.statementofresponsibilityby Fuchun Guo, Willy Susilo, Yi Mu.en_US
dc.description.tableofcontentsNotions, Definitions and Models -- Identity-Based Encryption -- Foundations of Group-Based Cryptography -- Foundations of Security Reduction -- Digital Signatures With Random Oracles -- Digital Signatures Without Random Oracles -- Public Key Encryption With Random Oracles -- Public Key Encryption Without Random Oracles -- Identity-Based Encryption With Random Oracles -- Identity-Based Encryption Without Random Oracles. ;en_US
dc.format.extentXV, 253 p. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319930480.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleIntroduction to Security Reductionen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319930480.pdf2.3 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuo, Fuchun. ;en_US
dc.contributor.authorSusilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;en_US
dc.contributor.authorMu, Yi. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:28Z-
dc.date.available2020-05-17T08:24:28Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319930497 ;en_US
dc.identifier.isbn9783319930480 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1019-
dc.descriptionen_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319930480. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ;en_US
dc.description.statementofresponsibilityby Fuchun Guo, Willy Susilo, Yi Mu.en_US
dc.description.tableofcontentsNotions, Definitions and Models -- Identity-Based Encryption -- Foundations of Group-Based Cryptography -- Foundations of Security Reduction -- Digital Signatures With Random Oracles -- Digital Signatures Without Random Oracles -- Public Key Encryption With Random Oracles -- Public Key Encryption Without Random Oracles -- Identity-Based Encryption With Random Oracles -- Identity-Based Encryption Without Random Oracles. ;en_US
dc.format.extentXV, 253 p. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319930480.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleIntroduction to Security Reductionen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319930480.pdf2.3 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuo, Fuchun. ;en_US
dc.contributor.authorSusilo, Willy. ; (orcid)http://orcid.org/0000-0002-1562-5105. ;en_US
dc.contributor.authorMu, Yi. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:28Z-
dc.date.available2020-05-17T08:24:28Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319930497 ;en_US
dc.identifier.isbn9783319930480 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1019-
dc.descriptionen_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319930480. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. ;en_US
dc.description.statementofresponsibilityby Fuchun Guo, Willy Susilo, Yi Mu.en_US
dc.description.tableofcontentsNotions, Definitions and Models -- Identity-Based Encryption -- Foundations of Group-Based Cryptography -- Foundations of Security Reduction -- Digital Signatures With Random Oracles -- Digital Signatures Without Random Oracles -- Public Key Encryption With Random Oracles -- Public Key Encryption Without Random Oracles -- Identity-Based Encryption With Random Oracles -- Identity-Based Encryption Without Random Oracles. ;en_US
dc.format.extentXV, 253 p. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319930480.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleIntroduction to Security Reductionen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319930480.pdf2.3 MBAdobe PDFThumbnail
Preview File