TY - BOOK AU - Mao,Wenbo TI - Modern cryptography: theory and practice SN - 0130669431 AV - QA76.9.A25 PY - 2004/// CY - Upper Saddle River, NJ PB - Prentice Hall PTR KW - Cryptography KW - Computers KW - Access control KW - Data transmission systems KW - Computer networks KW - Security measures N1 - pt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowlege protocols -- Returning to "coin flipping over telephone" -- Afterremark ER -