My Account Log in

2 options

Group theoretic cryptography / Maria Isabel Gonzalez Vasco, Universidad Rey Juan Carlos, Madrid, Spain, Rainer Steinwandt, Florida Atlantic University, Boca Raton, FL.

Ebook Central Academic Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
González Vasco, Maria Isabel, author.
Steinwandt, Rainer, author.
Vasco, Maria Isabel Gonzalez, author.
Series:
Chapman & Hall/CRC cryptography and network security.
Chapman and Hall/CRC Cryptography and Network Security
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Computer networks.
Physical Description:
1 online resource (244 p.)
Edition:
1st ed.
Place of Publication:
Boca Raton, Florida : CRC Press, [2015]
Language Note:
English
Summary:
Group theoretic problems appear to be the most promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using nonabelian groups in the field of cryptography. It provides an introduction to cryptography (mostly asymmetric) with a focus on group theoretic constructions, making it the first book to use this approach. The authors include all of the needed cryptographic and group theoretic concepts. They supply exercises at the end of each chapter, selected solutions in the back of the book, and suggestions for student
Contents:
Cover; Dedication; Contents; List of Figures; Symbol Description; Preface; Part I: Preliminaries; Chapter 1: Mathematical background; Chapter 2: Basics on complexity; Chapter 3: Cryptology: An introduction; Part II: Public-Key Encryption; Chapter 4: Provable security guarantees; Chapter 5: Public-key encryption in the standard model; Chapter 6: Public-key encryption using infinite groups; Part III: Secret-Key Encryption; Chapter 7: Block ciphers; Chapter 8: Cryptographic hash functions and message authentication codes; Part IV: Other Cryptographic Constructions
Chapter 9: Key establishment protocolsChapter 10: Signature and identification schemes; Part V: Appendix; Appendix A: Solutions to selected exercises; References
Notes:
Includes bibliographical references.
Description based on online resource; title from PDF title page (ebrary, viewed April 15, 2015).
A Chapman and Hall book--Title page.
ISBN:
9781040068472
1040068472
9780429136603
0429136609
9781466527232
1466527234
OCLC:
906180651

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account