Cryptography : theory and practice
著者
書誌事項
Cryptography : theory and practice
(Discrete mathematics and its applications / Kenneth H. Rosen, series editor)
CRC Press, c1995
大学図書館所蔵 全58件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references (p. 412-427) and index
内容説明・目次
内容説明
Cryptography is an outstanding book that covers all the major areas of cryptography in a readable, mathematically precise form. Several chapters deal with especially active areas of research and give the reader a quick introduction and overview of the basic results in the area.
Cryptography provides the mathematical theory that is necessary in order to understand how the various systems work. Most algorithms are presented in the form of pseudocode, together with examples and informal discussion of the underlying ideas. The book gives careful and comprehensive treatment of all the essential core areas of cryptography. Also, several chapters present recent topics that have not received thorough treatment in previous textbooks. Such topics include authentication codes, secret sharing schemes, identification schemes, and key distribution.
目次
CLASSICAL CRYPTOGRAPHY
Introduction: Some Simple Cryptosystems
Cryptanalysis
Notes
Exercises
SHANNON'S THEORY
Perfect Secrecy
Entropy
Properties of Entropy
Spurious Keys and Unicity Distance
Product Cryptosystems
Notes
Exercises
THE DATA ENCRYPTION STANDARD
Introduction
Description of DES
The DES Controversy
DES in Practice
A Time-Memory Trade-Off
Differential Cryptanalysis
Notes and References
Exercises
THE RSA SYSTEM AND FACTORING
Introduction to Public-Key Cryptography
More Number Theory
The RSA Cryptosystem
Implementing RSA
Probabilistic Primality Testing
Attacks on RSA
The Rabin Cryptosystem
Factoring Algorithms
Notes and References
Exercises
OTHER PUBLIC-KEY CRYPTOSYSTEMS
The ElGamal System and Discrete Logs
Finite Field and Elliptic Curve Systems
The Merkle-Hellman Knapsack System
The McEliece System
Notes and References
Exercises
SIGNATURE SCHEMES
Introduction
The ElGamal Signature Scheme
The Digital Signature Standard
One-Time Signatures
Undeniable Signatures
Fail-Stop Signatures
Notes and References
Exercises
HASH FUNCTIONS
Signatures and Hash Functions
Collision-Free Hash Functions
The Birthday Attack
A Discrete Log Hash Function
Extending Hash Functions
Hash Functions from Cryptosystems
The MD4 Hash Function
Timestamping
Notes and References
Exercises
KEY DISTRIBUTION AND KEY AGREEMENT
Introduction
Key Predistribution
Kerberos
Diffie-Hellman Key Exchange
Notes and References
IDENTIFICATION SCHEMES
Introduction
The Schnorr Identification Scheme
The Okamoto Identification Scheme
The Guillou-Quisquater Identification Scheme
Converting Identification to Signature Schemes
Notes and References
Exercises
AUTHENTICATION CODES
Introduction
Computing Deception Probabilities
Combinatorial Bounds
Entropy Bounds
Notes and References
Exercises
SECRET SHARING SCHEMES
Introduction: The Shamir Threshold Scheme
Access Structures and General Secret Sharing
The Monotone Circuit Construction
Formal Definitions
Information Rate
The Brickell Vector Space Construction
An Upper Bound on the Information Rate
The Decomposition Construction
Notes and References
Exercises
PSEUDO-RANDOM NUMBER GENERATION
Introduction and Examples
Indistinguishable Probability Distributions
The Blum-Blum-Shub Generator
Probabilistic Encryption
Notes and References
Exercises
ZERO-KNOWLEDGE PROOFS
Interactive Proof Systems
Perfect Zero-Knowledge Proofs
Bit Commitments
Computational Zero-Knowledge Proofs
Notes and References
Exercises
「Nielsen BookData」 より