Khulna University of Engineering & Technology
Central Library

Normal view MARC view ISBD view

Modern cryptography : theory and practice / Wenbo Mao.

By: Mao, Wenbo.
Material type: materialTypeLabelBookPublisher: Upper Saddle River, NJ : Prentice Hall PTR, c2004Description: xxxviii, 707 p. : ill. ; 24 cm.ISBN: 0130669431; 9780130669438; 813170212X.Subject(s): Cryptography | Computers -- Access control | Data transmission systems -- Security measuresDDC classification: 005.82
Contents:
Introduction -- Beginning with a Simple Communication Game -- Wrestling Between Safeguard and Attack -- Mathematical Foundations -- Standard Notation -- Probability and Information Theory -- Computational Complexity -- Algebraic Foundations -- Number Theory -- Basic Cryptographic Techniques -- Encryption - Symmetric Techniques -- Encryption - Asymmetric Techniques -- In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions -- Data Integrity Techniques -- Authentication -- Authentication Protocols - Principles -- Authentication Protocols - The Real World -- Authentication Framework for Public-Key Cryptography -- Formal Approaches to Security Establishment -- Formal and Strong Security Definitions for Public-Key Cryptosystems -- Provably Secure and Efficient Public-Key Cryptosystems -- Strong and Provable Security for Digital Signatures -- Formal Methods for Authentication Protocols Analysis -- Cryptographic Protocols -- Zero-Knowledge Protocols -- Returning to "Coin Flipping Over Telephone" -- Afterremark.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Copy number Status Date due Barcode Item holds
Books Books Central Library, KUET
General Stacks
005.82 MAO (Browse shelf) 1 Available 3010044036
Total holds: 0

Includes bibliographical references (p. 673-698) and index.

I. Introduction -- 1. Beginning with a Simple Communication Game -- 2. Wrestling Between Safeguard and Attack -- II. Mathematical Foundations -- Standard Notation -- 3. Probability and Information Theory -- 4. Computational Complexity -- 5. Algebraic Foundations -- 6. Number Theory -- III. Basic Cryptographic Techniques -- 7. Encryption - Symmetric Techniques -- 8. Encryption - Asymmetric Techniques -- 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions -- 10. Data Integrity Techniques -- IV. Authentication -- 11. Authentication Protocols - Principles -- 12. Authentication Protocols - The Real World -- 13. Authentication Framework for Public-Key Cryptography -- V. Formal Approaches to Security Establishment -- 14. Formal and Strong Security Definitions for Public-Key Cryptosystems -- 15. Provably Secure and Efficient Public-Key Cryptosystems -- 16. Strong and Provable Security for Digital Signatures -- 17. Formal Methods for Authentication Protocols Analysis -- VI. Cryptographic Protocols -- 18. Zero-Knowledge Protocols -- 19. Returning to "Coin Flipping Over Telephone" -- 20. Afterremark.

There are no comments for this item.

Log in to your account to post a comment.


Khulna University of Engineering & Technology
Funded by: HEQEP, UGC, Bangladesh