Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need.
Coverage includes:
Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions.
"synopsis" may belong to another edition of this title.
"This book would be a good addition to any cryptographer's bookshelf. The book is self-contained; it presents all the background material to understand an algorithm and all the development to prove its security. I'm not aware of another book that's as complete as this one."
--Christian Paquin, Cryptographic/Security Developer, Silanis Technology Inc. "The book is both complete, and extraordinarily technically accurate. It would certainly be a useful addition to any cryptographer's or crypto-engineer's library."
--Marcus Leech, Advisor, Security Architecture and Planning, Nortel Networks Build more secure crypto systems--and prove their trustworthiness Modern Cryptography is the indispensable resource for every technical professional who needs to implement strong security in real-world applications.
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need.
Coverage includes:
Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions.
"About this title" may belong to another edition of this title.
Shipping:
£ 3.19
Within U.S.A.
Book Description Hardcover. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0130669431
Book Description Hardcover. Condition: new. New. Seller Inventory # Wizard0130669431
Book Description Condition: new. Seller Inventory # FrontCover0130669431
Book Description Hardcover. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0130669431
Book Description Hardcover. Condition: new. Buy for Great customer experience. Seller Inventory # GoldenDragon0130669431
Book Description Hardcover. Condition: New. Seller Inventory # Abebooks43090
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 2.82. Seller Inventory # Q-0130669431
Book Description Condition: New. Buy with confidence! Book is in new, never-used condition. Seller Inventory # bk0130669431xvz189zvxnew
Book Description Condition: New. New! This book is in the same immaculate condition as when it was published. Seller Inventory # 353-0130669431-new
Book Description Hardcover. Condition: Brand New. 1st edition. 648 pages. 9.25x7.00x1.00 inches. In Stock. Seller Inventory # 0130669431