|
|
|||
|
||||
OverviewThis exciting new resource provides a comprehensive overview of the field of cryptography and the current state of the art. It delivers an overview about cryptography as a field of study and the various unkeyed, secret key, and public key cryptosystems that are available, and it then delves more deeply into the technical details of the systems. It introduces, discusses, and puts into perspective the cryptographic technologies and techniques, mechanisms, and systems that are available today. Random generators and random functions are discussed, as well as one-way functions and cryptography hash functions. Pseudorandom generators and their functions are presented and described. Symmetric encryption is explored, and message authentical and authenticated encryption are introduced. Readers are given overview of discrete mathematics, probability theory and complexity theory. Key establishment is explained. Asymmetric encryption and digital signatures are also identified. Written by an expert in the field, this book provides ideas and concepts that are beneficial to novice as well as experienced practitioners. Full Product DetailsAuthor: Rolf Oppliger , Julia AndrusenkoPublisher: Artech House Publishers Imprint: Artech House Publishers Edition: Unabridged edition Dimensions: Width: 16.10cm , Height: 4.30cm , Length: 23.60cm Weight: 1.184kg ISBN: 9781630818463ISBN 10: 1630818461 Pages: 650 Publication Date: 30 June 2021 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsIntroduction; Cryptographic Systems; I UNKEYED CRYPTOSYSTEMS: Random Generators; Random Functions; One-Way Functions; Cryptographic Hash Functions; II SECRET KEY CRYPTOSYSTEMS: Pseudorandom Generator; Pseudorandom Functions; Symmetric Encryption; Message Authentication; Authenticated Encryption; III PUBLIC KEY CRYPTOSYSTEMS: Key Establishment; Asymmetric Encryption; Digital Signatures; Zero-Knowledge Proofs of Knowledge; IV CONCLUSIONS: Key Management; Summary; OutlookReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |