Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1669
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lindell, Yehuda. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:31:03Z | - |
dc.date.available | 2020-05-17T08:31:03Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319570488 ; | en_US |
dc.identifier.isbn | 9783319570471 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1669 | - |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319570471. ; | en_US |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study. This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography. ; | en_US |
dc.description.statementofresponsibility | edited by Yehuda Lindell. | en_US |
dc.description.tableofcontents | Garbled Circuits as Randomized Encodings of Functions: A Primer -- The Complexity of Public-Key Cryptography -- Pseudorandom Functions: Three Decades Later -- The Many Entropies in One-Way Functions -- Homomorphic Encryption -- How to Simulate It: A Tutorial on the Simulation Proof Technique -- The Complexity of Differential Privacy. ; | en_US |
dc.format.extent | XV, 450 p. 26 illus., 5 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Information Security and Cryptography, ; 1619-7100. ; | en_US |
dc.relation.ispartofseries | Information Security and Cryptography, ; 1619-7100. ; | en_US |
dc.relation.haspart | 9783319570488.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Theory of Computation. ; | en_US |
dc.title | Tutorials on the Foundations of Cryptography | en_US |
dc.title.alternative | Dedicated to Oded Goldreich / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.lc | QA76.9.D35 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319570488.pdf | 4.52 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lindell, Yehuda. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:31:03Z | - |
dc.date.available | 2020-05-17T08:31:03Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319570488 ; | en_US |
dc.identifier.isbn | 9783319570471 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1669 | - |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319570471. ; | en_US |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study. This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography. ; | en_US |
dc.description.statementofresponsibility | edited by Yehuda Lindell. | en_US |
dc.description.tableofcontents | Garbled Circuits as Randomized Encodings of Functions: A Primer -- The Complexity of Public-Key Cryptography -- Pseudorandom Functions: Three Decades Later -- The Many Entropies in One-Way Functions -- Homomorphic Encryption -- How to Simulate It: A Tutorial on the Simulation Proof Technique -- The Complexity of Differential Privacy. ; | en_US |
dc.format.extent | XV, 450 p. 26 illus., 5 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Information Security and Cryptography, ; 1619-7100. ; | en_US |
dc.relation.ispartofseries | Information Security and Cryptography, ; 1619-7100. ; | en_US |
dc.relation.haspart | 9783319570488.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Theory of Computation. ; | en_US |
dc.title | Tutorials on the Foundations of Cryptography | en_US |
dc.title.alternative | Dedicated to Oded Goldreich / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.lc | QA76.9.D35 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319570488.pdf | 4.52 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lindell, Yehuda. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:31:03Z | - |
dc.date.available | 2020-05-17T08:31:03Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319570488 ; | en_US |
dc.identifier.isbn | 9783319570471 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1669 | - |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319570471. ; | en_US |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study. This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography. ; | en_US |
dc.description.statementofresponsibility | edited by Yehuda Lindell. | en_US |
dc.description.tableofcontents | Garbled Circuits as Randomized Encodings of Functions: A Primer -- The Complexity of Public-Key Cryptography -- Pseudorandom Functions: Three Decades Later -- The Many Entropies in One-Way Functions -- Homomorphic Encryption -- How to Simulate It: A Tutorial on the Simulation Proof Technique -- The Complexity of Differential Privacy. ; | en_US |
dc.format.extent | XV, 450 p. 26 illus., 5 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Information Security and Cryptography, ; 1619-7100. ; | en_US |
dc.relation.ispartofseries | Information Security and Cryptography, ; 1619-7100. ; | en_US |
dc.relation.haspart | 9783319570488.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Theory of Computation. ; | en_US |
dc.title | Tutorials on the Foundations of Cryptography | en_US |
dc.title.alternative | Dedicated to Oded Goldreich / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.lc | QA76.9.D35 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319570488.pdf | 4.52 MB | Adobe PDF | Preview File |