
Más información sobre el libro
This book covers a comprehensive range of topics in cryptography and network security. It begins with signature schemes, discussing generic transformations to strongly unforgeable signatures and efficient on-line/off-line signatures that prevent key exposure. It explores Merkle signatures with extensive capacity and delves into computer and network security, contrasting midpoints and endpoints from protocols to firewalls. Notably, it presents an adversary-aware attack model and analyzes electronic cash protocols using applied Pi calculus. The cryptanalysis section addresses vulnerabilities, including the TRMC-4 public key cryptosystem and timing attacks on Blakley’s algorithm, while also discussing methods to protect AES implementations against power analysis. Group-oriented security is examined through constant-round authenticated group key exchanges and strategies to prevent collusion attacks on one-way function trees. The book also introduces innovative cryptographic protocols, such as a new method for conditional disclosure of secrets, unconditionally secure multi-party set intersection protocols, and privacy-preserving set unions. It covers identity-based cryptography, including proxy re-encryption and identification schemes, and discusses security in wireless and peer-to-peer networks, highlighting efficient content authentication and self-healing key distribution methods. Finally, it presents advanced signature schem
Compra de libros
Applied cryptography and network security, Jonathan Katz
- Idioma
- Publicado en
- 2007
- product-detail.submit-box.info.binding
- (Tapa blanda)
Métodos de pago
Nadie lo ha calificado todavía.