Foundations of Cryptography : Volume 2: Basic Applications [ electronic resource ] / by Oded Goldreich.
By: Goldreich, Oded.
Material type: TextPublisher: Cambridge: Cambridge University Press , 2010ISBN: 9780511721656 ( e-book ).Subject(s): Computer Science | Cryptography | Cryptology and Coding | Information Theory and Coding | Mathematics | Discrete MathematicsGenre/Form: Electronic booksDDC classification: 652.8 Online resources: https://doi.org/10.1017/CBO9780511721656 View to click Summary: Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
E-Book | WWW | 652.8 GOL/F (Browse shelf) | Available | EB159 |
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.
There are no comments for this item.