Seong Oun Hwang, Intae Kim, Wai Kong Lee
Modern Cryptography with Proof Techniques and Implementations
Seong Oun Hwang, Intae Kim, Wai Kong Lee
Modern Cryptography with Proof Techniques and Implementations
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Proof techniques in cryptography are very difficult to understand even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proof of the cryptographic schemes, practical aspects of them have received comparatively less attention.
Andere Kunden interessierten sich auch für
- Blockchain for Information Security and Privacy146,99 €
- Shaoliang PengBlockchain for Big Data90,99 €
- Bhawana RudraFlexible Network Architectures Security107,99 €
- Advances in Distance Learning in Times of Pandemic156,99 €
- Yücel Karabulut / John C. Mitchell / Peter Herrmann / Christian Damsgaard Jensen (eds.)Trust Management II74,99 €
- Trust Management II74,99 €
- Sergei PetrenkoDeveloping a Cybersecurity Immune System for Industry 4.0145,99 €
-
-
-
Proof techniques in cryptography are very difficult to understand even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proof of the cryptographic schemes, practical aspects of them have received comparatively less attention.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 510
- Erscheinungstermin: 29. März 2021
- Englisch
- Abmessung: 234mm x 156mm x 29mm
- Gewicht: 889g
- ISBN-13: 9781138584082
- ISBN-10: 1138584088
- Artikelnr.: 61373904
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: CRC Press
- Seitenzahl: 510
- Erscheinungstermin: 29. März 2021
- Englisch
- Abmessung: 234mm x 156mm x 29mm
- Gewicht: 889g
- ISBN-13: 9781138584082
- ISBN-10: 1138584088
- Artikelnr.: 61373904
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Seong Oun Hwang received the BS degree in Mathematics in 1993 from the Seoul National University, the MS degree in Computer and Communications Engineering in 1998 from the Pohang University of Science and Technology, and the PhD degree in Computer Science from the Korea Advanced Institute of Science and Technology. He worked as a software engineer at the LG-CNS Systems, Inc. from 1994 to 1996. He worked as a senior researcher at the Electronics and Telecommunications Research Institute (ETRI) from 1998 to 2007. Since 2008, he has been working as an associate professor with the Department of Computer and Information Communication Engineering, Hongik University, Korea. His research interests include cryptography, cyber security and mobile network. He is a member of IEEE and IEEE Communications Society. He is also a lifelong member of IEEK (Institute of Electronics and Information Engineers) and KIISC (Korea Institute of Information Security and Cryptology). He has served as a director in IEEK Computer Society and led the Commission of Information Security in the IEEK Computer Society. He has led ICGHIT, one of the famous international conferences as an organizing chair. He has been an editor at ETRI Journal, International Journal of Advanced Research in Computer and Information Security, International Journal of Software Engineering, and Journal of Security Engineering Research Support Center. As an guest editor, he served a lot of journals including Journal of Intelligent and Fuzzy System, Springer's Lecture Notes in Electrical Engineering, International Journal of Computational Vision and Robotics, International Journal of Internet Technology and Secured Transactions. He has also been the reviewers for international journals such as IEEE Computer, IEEE Transactions on Dependable and Secure Computing, Security and Communications Network, Journal of Communications and Networks, Journal of Systems and Software, Nonlinear Dynamics, Computer and Communications, Wireless Personal Communications, and so on. He has authored three books on information security and its applications. He also published a lot of outstanding research papers on information security in premium journals such as IEEE Transactions on Computers and IEEE Transactions on Broadcasting. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 - 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.
Part 1: Foundations of Cryptography.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
Part 1: Foundations of Cryptography.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
Part 1: Foundations of Cryptography.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
Part 1: Foundations of Cryptography.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.