Knihobot
Knihu momentálně nemáme skladem

Theory of cryptography

Více o knize

InhaltsverzeichnisZero-Knowledge.Concurrent Zero Knowledge Without Complexity Assumptions.Interactive Zero-Knowledge with Restricted Random Oracles.Non-interactive Zero-Knowledge from Homomorphic Encryption.Primitives.Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles.Efficient Blind and Partially Blind Signatures Without Random Oracles.Key Exchange Using Passwords and Long Keys.Mercurial Commitments: Minimal Assumptions and Efficient Constructions.Assumptions and Models.Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices.On Error Correction in the Exponent.On the Relation Between the Ideal Cipher and the Random Oracle Models.The Bounded-Retrieval Model.Intrusion-Resilience Via the Bounded-Storage Model.Perfectly Secure Password Protocols in the Bounded Retrieval Model.Privacy.Polylogarithmic Private Approximations and Efficient Matching.Calibrating Noise to Sensitivity in Private Data Analysis.Secret Sharing and Multi-party Computation (I).Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.Efficient Multi-party Computation with Dispute Control.Round-Optimal and Efficient Verifiable Secret Sharing.Universally-Composible Security.Generalized Environmental Security from Number Theoretic Assumptions.Games and the Impossibility of Realizable Ideal Functionality.Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.Resource Fairness and Composability of Cryptographic Protocols.One-Way Functions and Friends.Finding Pessiland.Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness.On the Complexity of Parallel Hardness Amplification for One-Way Functions.Secret Sharing and Multi-party Computation (II).On Matroids and Non-ideal Secret Sharing.Secure Computation with Partial Message Loss.Communication Efficient Secure Linear Algebra.Threshold and Proactive Pseudo-Random Permutations.Pseudo-Random Functions and Encryption.PRF Domain Extension Using DAGs.Chosen-Ciphertext Security from Tag-Based Encryption.Separating Sources for Encryption and Secret Sharing.

Nákup knihy

Theory of cryptography, Shai Halevi

Jazyk
Rok vydání
2006
Jakmile ji vyčmucháme, pošleme vám e-mail.

Doručení

  •  

Platební metody

Navrhnout úpravu