Symmetric Cryptographic Protocols

This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Ramkumar, Mahalingam (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2014.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02728nam a22004575i 4500
001 978-3-319-07584-6
003 DE-He213
005 20151204152230.0
007 cr nn 008mamaa
008 140805s2014 gw | s |||| 0|eng d
020 |a 9783319075846  |9 978-3-319-07584-6 
024 7 |a 10.1007/978-3-319-07584-6  |2 doi 
040 |d GrThAP 
050 4 |a TK1-9971 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
100 1 |a Ramkumar, Mahalingam.  |e author. 
245 1 0 |a Symmetric Cryptographic Protocols  |h [electronic resource] /  |c by Mahalingam Ramkumar. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XVII, 234 p. 21 illus., 1 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Some Useful Constructions -- Non-scalable Key Distribution Schemes -- MLS for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable Schemes -- Using PKPSs With Tamper-Responsive Modules -- Broadcast Authentication and Broadcast Encryption -- Authenticated Data Structures -- Universal Trusted Computing Bases -- Conclusions and References. 
520 |a This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases. 
650 0 |a Engineering. 
650 0 |a Data structures (Computer science). 
650 0 |a Computers. 
650 0 |a Electrical engineering. 
650 1 4 |a Engineering. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Information Systems and Communication Service. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319075839 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-07584-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)