Symmetric cryptographic protocols / Mahalingam Ramkumar.
This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
[2014]
|
Subjects: |
MARC
LEADER | 00000cam a2200000xi 4500 | ||
---|---|---|---|
001 | b7814911 | ||
003 | CoU | ||
005 | 20170421042052.7 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 140815t20142014sz a ob 001 0 eng d | ||
019 | |a 893684381 | ||
020 | |a 9783319075846 |q (electronic bk.) | ||
020 | |a 3319075845 |q (electronic bk.) | ||
020 | |a 3319075837 |q (print) | ||
020 | |a 9783319075839 |q (print) | ||
020 | |z 9783319075839 | ||
024 | 7 | |a 10.1007/978-3-319-07584-6 | |
035 | |a (OCoLC)spr887183430 | ||
035 | |a (OCoLC)887183430 |z (OCoLC)893684381 | ||
037 | |a spr10.1007/978-3-319-07584-6 | ||
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d N$T |d UKMGB |d YDXCP |d COO |d CDX |d IDEBK |d UPM |d OCLCF |d E7B |d EBLCP |d OCLCQ | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 | |
100 | 1 | |a Ramkumar, Mahalingam, |e author. | |
245 | 1 | 0 | |a Symmetric cryptographic protocols / |c Mahalingam Ramkumar. |
264 | 1 | |a Cham : |b Springer, |c [2014] | |
264 | 4 | |c ©2014. | |
300 | |a 1 online resource (xvi, 234 pages) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction -- Some Useful Constructions -- Non-scalable Key Distribution Schemes -- MLS for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable Schemes -- Using PKPSs With Tamper-Responsive Modules -- Broadcast Authentication and Broadcast Encryption -- Authenticated Data Structures -- Universal Trusted Computing Bases -- Conclusions and References. | |
520 | |a This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees. - Provides detailed coverage of symmetric key protocols - Describes various applications of symmetric building blocks - Includes strategies for constructing compact and efficient digests of dynamic databases. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed August 15, 2014) | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524. | |
650 | 0 | |a Cryptography. |0 http://id.loc.gov/authorities/subjects/sh85034453. | |
650 | 7 | |a Cryptography. |2 fast |0 (OCoLC)fst00884552. | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935. | |
776 | 0 | 8 | |i Printed edition: |z 9783319075839. |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-07584-6 |z Full Text (via Springer) |
907 | |a .b78149113 |b 03-19-20 |c 09-09-14 | ||
998 | |a web |b 05-01-17 |c g |d b |e - |f eng |g sz |h 0 |i 1 | ||
907 | |a .b78149113 |b 07-02-19 |c 09-09-14 | ||
944 | |a MARS - RDA ENRICHED | ||
907 | |a .b78149113 |b 07-06-17 |c 09-09-14 | ||
907 | |a .b78149113 |b 05-23-17 |c 09-09-14 | ||
915 | |a I | ||
956 | |a Springer e-books | ||
956 | |b Springer Engineering eBooks 2014 English+International | ||
956 | |b Springer English/International eBooks 2014 - Full Set | ||
999 | f | f | |i 7c1bbcb7-004c-5f04-9b0f-5de0782d789b |s 467c2042-e4ab-5bce-adb4-42be9f22f82d |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 |h Library of Congress classification |i Ebooks, Prospector |n 1 |