000 03562nam a22003855i 4500
001 299565
003 MX-SnUAN
005 20160429155554.0
007 cr nn 008mamaa
008 150903s2010 gw | o |||| 0|eng d
020 _a9783540894117
_99783540894117
024 7 _a10.1007/9783540894117
_2doi
035 _avtls000352527
039 9 _a201509030200
_bVLOAD
_c201405060306
_dVLOAD
_y201402180921
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.D35
100 1 _aDent, Alexander W.
_eeditor.
_9336563
245 1 0 _aPractical Signcryption /
_cedited by Alexander W. Dent, Yuliang Zheng.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _axviii, 274 páginas
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aInformation Security and Cryptography,
_x1619-7100
500 _aSpringer eBooks
505 0 _aSecurity Models for Signcryption -- Security for Signcryption: The Two-User Model -- Security for Signcryption: The Multi-User Model -- Signcryption Schemes -- Signcryption Schemes Based on the Diffie–Hellman Problem -- Signcryption Schemes Based on Bilinear Maps -- Signcryption Schemes Based on the RSA Problem -- Construction Techniques -- Hybrid Signcryption -- Concealment and Its Applications to Authenticated Encryption -- Parallel Signcryption -- Extensions of Signcryption -- Identity-Based Signcryption -- Key Establishment Using Signcryption Techniques -- Applications of Signcryption.
520 _aIn today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aZheng, Yuliang.
_eeditor.
_9336564
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540894094
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-540-89411-7
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c299565
_d299565