Amazon cover image
Image from Amazon.com

Modern cryptography : theory and practice / Wenbo Mao.

By: Material type: TextTextSeries: Hewlett-Packard professional booksPublication details: Upper Saddle River, NJ : Prentice Hall PTR, ©2004.Description: xxxviii, 707 p. : ill. ; 24 cmISBN:
  • 0130669431
  • 9780130669438
Subject(s): LOC classification:
  • QA76.9.A25 M36 2004
Contents:
pt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowledge protocols -- Returning to "coin flipping over telephone" -- Afterremark.
Item type: Books
Holdings
Current library Collection Call number Vol info Status Date due Barcode
Judith Thomas Library General Stacks BKS QA 76.9 .A25 M36 2004 (Browse shelf(Opens below)) AUA014373 Available AUA014373

pt. 1. Introduction. Beginning with a simple communication game --
Wrestling between safeguard and attack --
pt. 2. Mathematical foundations. Probability and information theory --
Computational complexity --
Algebraic foundations --
Number theory --
pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques --
Encryption: asymmetric techniques --
In an ideal world: bit security of the basic public-key cryptographic functions --
Data integrity techniques --
pt. 4. Authentication. Authentication protocols: principles --
Authentication protocols: the real world --
Authentication framework for public-key cryptography --
pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems --
Provably secure and efficient public-key cryptosystems --
Strong and provable security for digital signatures --
Formal methods for authentication protocols analysis --
pt. 6. Cryptographic protocols. Zero-knowledge protocols --
Returning to "coin flipping over telephone" --
Afterremark.