Symmetric Cryptographic Protocols
This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...
| Κύριος συγγραφέας: | |
|---|---|
| Συγγραφή απο Οργανισμό/Αρχή: | |
| Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
| Γλώσσα: | English |
| Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
| Θέματα: | |
| Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Introduction
- Some Useful Constructions
- Non-scalable Key Distribution Schemes
- MLS for Internet Security Protocols
- Scalable Key Distribution Schemes
- Scalable Extensions of Non-scalable Schemes
- Using PKPSs With Tamper-Responsive Modules
- Broadcast Authentication and Broadcast Encryption
- Authenticated Data Structures
- Universal Trusted Computing Bases
- Conclusions and References.