Bookbot

Information security and privacy

Parameters

  • 402 pages
  • 15 hours of reading

More about the book

The content covers various aspects of cryptography and network security, including symmetric key encryption and cryptanalysis techniques. It discusses a generalized unbalanced Feistel network structure and explores improved algebraic cryptanalysis methods for QUAD, Bivium, and Trivium through graph partitioning on equation systems. The text delves into multidimensional linear cryptanalysis and side-channel analysis of the K2 stream cipher, as well as unbiased linear approximations and hash functions. Distinguishers for Hamsi-256's compression function and output transformation are analyzed, along with second-preimage analysis of reduced SHA-1 and observations on indifferentiability. In public key cryptography, topics include adaptive and composable non-committing encryptions, relations among complete non-malleability notions, and strong knowledge extractors for public-key encryption schemes. A multi-trapdoor commitment scheme based on the RSA assumption and an identity-based chameleon hash scheme without key exposure are also presented. Security models for unidirectional proxy re-signature and estimates for quadratic field-based cryptosystems are discussed. Protocols covered include one-time-password-authenticated key exchange, predicate-based key exchange, and attribute-based authenticated key exchange, along with optimally tight security proofs for hash-then-publish timestamping. It also addresses additive combinatorics an

Book purchase

Information security and privacy, Ron Steinfeld

Language
Released
2010
product-detail.submit-box.info.binding
(Paperback)
We’ll email you as soon as we track it down.

Payment methods

No one has rated yet.Add rating