000 | 02062cam a2200337Ia 4500 | ||
---|---|---|---|
999 |
_c200438846 _d57058 |
||
003 | TR-AnTOB | ||
005 | 20240419084120.0 | ||
007 | ta | ||
008 | 030811s2004 njua b 001 0 eng d | ||
020 | _a0130669431 | ||
040 |
_aHPG _cHPG _dIXA _dGHG _dBGZ _dTR-AnTOB _beng _erda |
||
041 | 0 | _aeng | |
050 | _aQA76.9.A25 | ||
090 |
_aQA76.9.A25 _bM36 2004 |
||
100 | 1 |
_aMao, Wenbo _9128678 _eauthor |
|
245 | 1 | 0 |
_aModern cryptography : _btheory and practice / _cWenbo Mao. |
264 | 1 |
_aUpper Saddle River, NJ : _bPrentice Hall PTR, _c2004. |
|
264 | 4 | _c©2004 | |
300 |
_axxxviii, 707 pages : _billustrations ; _c24 cm |
||
336 |
_2rdacontent _atext _btxt |
||
337 |
_2rdamedia _aunmediated _bn |
||
338 |
_2rdacarrier _avolume _bnc |
||
505 | 0 | _apt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowlege protocols -- Returning to "coin flipping over telephone" -- Afterremark. | |
590 | _aORDER 2004 | ||
650 | 0 | _aCryptography. | |
650 | 0 |
_aComputers _xAccess control _921454 |
|
650 | 0 |
_aData transmission systems _91560 |
|
650 | 0 |
_aComputer networks _xSecurity measures _947 |
|
942 |
_2lcc _cBK |