TEST - Catálogo BURRF
   

Cryptography made simple / Nigel P. Smart.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Information Security and CryptographyEditor: Cham : Springer International Publishing : Springer, 2016Edición: 1st ed. 2015Descripción: xii, 481 páginas : 119 ilustraciones, 15 ilustraciones en colorTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9783319219363
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA76.9.D35
Recursos en línea:
Contenidos:
Modular Arithmetic, Groups, Finite Fields and Probability -- Elliptic Curves -- Historical Ciphers -- The Enigma Machine -- Information Theoretic Security -- Historical Stream Ciphers -- Modern Stream Ciphers -- Block Ciphers -- Symmetric Key Distribution -- Hash Functions and Message Authentication Codes -- Basic Public Key Encryption Algorithms -- Primality Testing and Factoring -- Discrete Logarithms -- Key Exchange and Signature Schemes -- Implementation Issues -- Obtaining Authentic Public Keys -- Attacks on Public Key Schemes -- Definitions of Security -- Complexity Theoretic Approaches -- Provable Security: With Random Oracles -- Hybrid Encryption -- Provable Security: Without Random Oracles -- Secret Sharing Schemes -- Commitments and Oblivious Transfer -- Zero-Knowledge Proofs -- Secure Multiparty Computation.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

Modular Arithmetic, Groups, Finite Fields and Probability -- Elliptic Curves -- Historical Ciphers -- The Enigma Machine -- Information Theoretic Security -- Historical Stream Ciphers -- Modern Stream Ciphers -- Block Ciphers -- Symmetric Key Distribution -- Hash Functions and Message Authentication Codes -- Basic Public Key Encryption Algorithms -- Primality Testing and Factoring -- Discrete Logarithms -- Key Exchange and Signature Schemes -- Implementation Issues -- Obtaining Authentic Public Keys -- Attacks on Public Key Schemes -- Definitions of Security -- Complexity Theoretic Approaches -- Provable Security: With Random Oracles -- Hybrid Encryption -- Provable Security: Without Random Oracles -- Secret Sharing Schemes -- Commitments and Oblivious Transfer -- Zero-Knowledge Proofs -- Secure Multiparty Computation.

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha