Symmetric cryptographic protocols / Mahalingam Ramkumar.

This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Main Author: Ramkumar, Mahalingam (Author)
Format: eBook
Language:English
Published: Cham : Springer, [2014]
Subjects:

MARC

LEADER 00000cam a2200000xi 4500
001 b7814911
003 CoU
005 20170421042052.7
006 m o d
007 cr |||||||||||
008 140815t20142014sz a ob 001 0 eng d
019 |a 893684381 
020 |a 9783319075846  |q (electronic bk.) 
020 |a 3319075845  |q (electronic bk.) 
020 |a 3319075837  |q (print) 
020 |a 9783319075839  |q (print) 
020 |z 9783319075839 
024 7 |a 10.1007/978-3-319-07584-6 
035 |a (OCoLC)spr887183430 
035 |a (OCoLC)887183430  |z (OCoLC)893684381 
037 |a spr10.1007/978-3-319-07584-6 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d N$T  |d UKMGB  |d YDXCP  |d COO  |d CDX  |d IDEBK  |d UPM  |d OCLCF  |d E7B  |d EBLCP  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.A25 
100 1 |a Ramkumar, Mahalingam,  |e author. 
245 1 0 |a Symmetric cryptographic protocols /  |c Mahalingam Ramkumar. 
264 1 |a Cham :  |b Springer,  |c [2014] 
264 4 |c ©2014. 
300 |a 1 online resource (xvi, 234 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction -- Some Useful Constructions -- Non-scalable Key Distribution Schemes -- MLS for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable Schemes -- Using PKPSs With Tamper-Responsive Modules -- Broadcast Authentication and Broadcast Encryption -- Authenticated Data Structures -- Universal Trusted Computing Bases -- Conclusions and References. 
520 |a This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees. - Provides detailed coverage of symmetric key protocols - Describes various applications of symmetric building blocks - Includes strategies for constructing compact and efficient digests of dynamic databases. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed August 15, 2014) 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524. 
650 0 |a Cryptography.  |0 http://id.loc.gov/authorities/subjects/sh85034453. 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
776 0 8 |i Printed edition:  |z 9783319075839. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-07584-6  |z Full Text (via Springer) 
907 |a .b78149113  |b 03-19-20  |c 09-09-14 
998 |a web  |b 05-01-17  |c g  |d b   |e -  |f eng  |g sz   |h 0  |i 1 
907 |a .b78149113  |b 07-02-19  |c 09-09-14 
944 |a MARS - RDA ENRICHED 
907 |a .b78149113  |b 07-06-17  |c 09-09-14 
907 |a .b78149113  |b 05-23-17  |c 09-09-14 
915 |a I 
956 |a Springer e-books 
956 |b Springer Engineering eBooks 2014 English+International 
956 |b Springer English/International eBooks 2014 - Full Set 
999 f f |i 7c1bbcb7-004c-5f04-9b0f-5de0782d789b  |s 467c2042-e4ab-5bce-adb4-42be9f22f82d 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25  |h Library of Congress classification  |i Ebooks, Prospector  |n 1