000 02062cam a2200337Ia 4500
999 _c200438846
_d57058
003 TR-AnTOB
005 20240419084120.0
007 ta
008 030811s2004 njua b 001 0 eng d
020 _a0130669431
040 _aHPG
_cHPG
_dIXA
_dGHG
_dBGZ
_dTR-AnTOB
_beng
_erda
041 0 _aeng
050 _aQA76.9.A25
090 _aQA76.9.A25
_bM36 2004
100 1 _aMao, Wenbo
_9128678
_eauthor
245 1 0 _aModern cryptography :
_btheory and practice /
_cWenbo Mao.
264 1 _aUpper Saddle River, NJ :
_bPrentice Hall PTR,
_c2004.
264 4 _c©2004
300 _axxxviii, 707 pages :
_billustrations ;
_c24 cm
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
505 0 _apt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowlege protocols -- Returning to "coin flipping over telephone" -- Afterremark.
590 _aORDER 2004
650 0 _aCryptography.
650 0 _aComputers
_xAccess control
_921454
650 0 _aData transmission systems
_91560
650 0 _aComputer networks
_xSecurity measures
_947
942 _2lcc
_cBK