Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Asymmetric cryptography : primitives and protocols
by
Pointcheval, David, editor
in
Public key cryptography.
/ Data encryption (Computer science)
/ Cryptographie à clé publique.
/ Chiffrement (Informatique)
/ Public key cryptography
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Asymmetric cryptography : primitives and protocols
by
Pointcheval, David, editor
in
Public key cryptography.
/ Data encryption (Computer science)
/ Cryptographie à clé publique.
/ Chiffrement (Informatique)
/ Public key cryptography
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Book
Asymmetric cryptography : primitives and protocols
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what \"secure\" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.\"-- Page 4 of cover.
Publisher
ISTE Ltd. ; John Wiley & Sons, Inc.
Subject
ISBN
9781789450965, 1789450969
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.A25 A83 2022 | 1 | BOOK | GENERAL |
This website uses cookies to ensure you get the best experience on our website.