A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
A new signature scheme without random oracles
International Journal of Security and Networks
Unlinkable Randomizable Signature and Its Application in Group Signature
Information Security and Cryptology
Forward-Secure Multi-signatures
ICDCIT '08 Proceedings of the 5th International Conference on Distributed Computing and Internet Technology
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
Secure kNN computation on encrypted databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
A Storage Efficient Redactable Signature in the Standard Model
ISC '09 Proceedings of the 12th International Conference on Information Security
Teaching Public-Key Cryptography in School
ISSEP '10 Proceedings of the 4th International Conference on Informatics in Secondary Schools - Evolution and Perspectives: Teaching Fundamentals Concepts of Informatics
Privacy, abstract encryption and protocols: an ASM model - part I
ASM'03 Proceedings of the abstract state machines 10th international conference on Advances in theory and practice
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Implementing data security in student lifecycle management system at the university of Prishtina
WSEAS Transactions on Information Science and Applications
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
New key management systems for multilevel security
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
Hi-index | 0.00 |
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudo random bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. Answers to the exercises are provided on the Web page for this book.