Syndetics cover image
Image from Syndetics

Foundations of cryptography--a primer [electronic resource] / Oded Goldreich.

By: Goldreich, Oded.
Material type: TextTextSeries: Foundations and trends in theoretical computer science: Publisher: Boston : Now, c2005General Notes: Title from title screen (viewed Aug. 23, 2005); Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page.Bibliography: Includes bibliographical references.Description: 1 online resource.ISBN: 1933019522 (electronic bk.); 9781933019529 (electronic bk.).Subject(s): Coding theory | Cryptography -- MathematicsGenre/Form: Electronic books DDC classification: 652.8 Online resources: Access full-text materials at no charge:
Contents:
Abstract -- 1. Introduction and preliminaries -- Part 1. Basic tools. 2. Computational difficulty and one-way functions. 3. Pseudorandomness. 4. Zero-knowledge -- Part II. Basic applications. 5. Encryption schemes. 6. Signature and message authentication schemes. 7. General cryptographic protocols -- Acknowledgments -- References.
Summary: Revolutionary developments which took place in the 1980's have transformed cryptography from a semi-scientific discipline to a respectable field in theoretical Computer Science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced and classical notions as secure encryption and unforgeable signatures were placed on sound grounds. The resulting field of cryptography, reviewed in this survey, is strongly linked to complexity theory (in contrast to 'classical' cryptography which is strongly related to information theory).
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
E-book Davenport Library e-book E-book 652.8 (Browse shelf(Opens below)) Not For Loan mq545172

Title from title screen (viewed Aug. 23, 2005).

Includes bibliographical references.

Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page.

Abstract -- 1. Introduction and preliminaries -- Part 1. Basic tools. 2. Computational difficulty and one-way functions. 3. Pseudorandomness. 4. Zero-knowledge -- Part II. Basic applications. 5. Encryption schemes. 6. Signature and message authentication schemes. 7. General cryptographic protocols -- Acknowledgments -- References.

Revolutionary developments which took place in the 1980's have transformed cryptography from a semi-scientific discipline to a respectable field in theoretical Computer Science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced and classical notions as secure encryption and unforgeable signatures were placed on sound grounds. The resulting field of cryptography, reviewed in this survey, is strongly linked to complexity theory (in contrast to 'classical' cryptography which is strongly related to information theory).

There are no comments on this title.

to post a comment.

Powered by Koha