Normal view MARC view ISBD view

Contemporary Cryptology [electronic resource] /by Dario Catalano, Ronald Cramer, Giovanni Crescenzo, Ivan Darmgård, David Pointcheval, Tsuyoshi Takagi.

by Catalano, Dario [author.]; Cramer, Ronald [author.]; Crescenzo, Giovanni [author.]; Darmgård, Ivan [author.]; Pointcheval, David [author.]; Takagi, Tsuyoshi [author.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Advanced Courses in Mathematics - CRM Barcelona, Centre de Recerca Matemàtica: Publisher: Basel : Birkhäuser Basel, 2005.Description: VIII, 237 p. online resource.ISBN: 9783764373948.Subject(s): Computer science | Data structures (Computer science) | Coding theory | Information theory | Computational complexity | Mathematics | Computer Science | Data Structures, Cryptology and Information Theory | Coding and Information Theory | Theory of Computation | Mathematics of Computing | Discrete Mathematics in Computer Science | Applications of MathematicsDDC classification: 005.74 Online resources: Click here to access online
Contents:
Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.
In: Springer eBooksSummary: The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distributed computation modulo a shared secret - multiparty computation - foundations of modern cryptography - provable security for public key schemes - efficient and secure public-key cryptosystems.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)

Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distributed computation modulo a shared secret - multiparty computation - foundations of modern cryptography - provable security for public key schemes - efficient and secure public-key cryptosystems.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha