Cryptography : theory and practice

書誌事項

Cryptography : theory and practice

Douglas R. Stinson

(Discrete mathematics and its applications / Kenneth H. Rosen, series editor)

CRC Press, c1995

大学図書館所蔵 件 / 58

この図書・雑誌をさがす

注記

Includes bibliographical references (p. 412-427) and index

内容説明・目次

内容説明

Cryptography is an outstanding book that covers all the major areas of cryptography in a readable, mathematically precise form. Several chapters deal with especially active areas of research and give the reader a quick introduction and overview of the basic results in the area. Cryptography provides the mathematical theory that is necessary in order to understand how the various systems work. Most algorithms are presented in the form of pseudocode, together with examples and informal discussion of the underlying ideas. The book gives careful and comprehensive treatment of all the essential core areas of cryptography. Also, several chapters present recent topics that have not received thorough treatment in previous textbooks. Such topics include authentication codes, secret sharing schemes, identification schemes, and key distribution.

目次

CLASSICAL CRYPTOGRAPHY Introduction: Some Simple Cryptosystems Cryptanalysis Notes Exercises SHANNON'S THEORY Perfect Secrecy Entropy Properties of Entropy Spurious Keys and Unicity Distance Product Cryptosystems Notes Exercises THE DATA ENCRYPTION STANDARD Introduction Description of DES The DES Controversy DES in Practice A Time-Memory Trade-Off Differential Cryptanalysis Notes and References Exercises THE RSA SYSTEM AND FACTORING Introduction to Public-Key Cryptography More Number Theory The RSA Cryptosystem Implementing RSA Probabilistic Primality Testing Attacks on RSA The Rabin Cryptosystem Factoring Algorithms Notes and References Exercises OTHER PUBLIC-KEY CRYPTOSYSTEMS The ElGamal System and Discrete Logs Finite Field and Elliptic Curve Systems The Merkle-Hellman Knapsack System The McEliece System Notes and References Exercises SIGNATURE SCHEMES Introduction The ElGamal Signature Scheme The Digital Signature Standard One-Time Signatures Undeniable Signatures Fail-Stop Signatures Notes and References Exercises HASH FUNCTIONS Signatures and Hash Functions Collision-Free Hash Functions The Birthday Attack A Discrete Log Hash Function Extending Hash Functions Hash Functions from Cryptosystems The MD4 Hash Function Timestamping Notes and References Exercises KEY DISTRIBUTION AND KEY AGREEMENT Introduction Key Predistribution Kerberos Diffie-Hellman Key Exchange Notes and References IDENTIFICATION SCHEMES Introduction The Schnorr Identification Scheme The Okamoto Identification Scheme The Guillou-Quisquater Identification Scheme Converting Identification to Signature Schemes Notes and References Exercises AUTHENTICATION CODES Introduction Computing Deception Probabilities Combinatorial Bounds Entropy Bounds Notes and References Exercises SECRET SHARING SCHEMES Introduction: The Shamir Threshold Scheme Access Structures and General Secret Sharing The Monotone Circuit Construction Formal Definitions Information Rate The Brickell Vector Space Construction An Upper Bound on the Information Rate The Decomposition Construction Notes and References Exercises PSEUDO-RANDOM NUMBER GENERATION Introduction and Examples Indistinguishable Probability Distributions The Blum-Blum-Shub Generator Probabilistic Encryption Notes and References Exercises ZERO-KNOWLEDGE PROOFS Interactive Proof Systems Perfect Zero-Knowledge Proofs Bit Commitments Computational Zero-Knowledge Proofs Notes and References Exercises

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

  • NII書誌ID(NCID)
    BA25246955
  • ISBN
    • 0849385210
  • LCCN
    95005237
  • 出版国コード
    us
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Boca Raton ; Tokyo
  • ページ数/冊数
    434 p.
  • 大きさ
    24 cm
  • 分類
  • 件名
  • 親書誌ID
ページトップへ