03574oam 2200709I 450 991078802360332120220623191444.00-429-13660-91-4665-2723-410.1201/b18272(CKB)2670000000607459(EBL)1619960(SSID)ssj0001505392(PQKBManifestationID)11945179(PQKBTitleCode)TC0001505392(PQKBWorkID)11489780(PQKB)10202175(SSID)ssj0001542742(PQKBManifestationID)16131576(PQKBTitleCode)TC0001542742(PQKBWorkID)14791858(PQKB)11442084(MiAaPQ)EBC1619960(OCoLC)906180651(CaSebORM)9781584888369(PPN)189405880(EXLCZ)99267000000060745920180331h20152015 uy 0engur|n|---|||||txtccrGroup theoretic cryptography /Maria Isabel Gonzalez Vasco, Universidad Rey Juan Carlos, Madrid, Spain, Rainer Steinwandt, Florida Atlantic University, Boca Raton, FLBoca Raton, Florida :CRC Press,[2015]©20151 online resource (244 p.)Chapman and Hall/CRC Cryptography and Network SecurityA Chapman and Hall book--Title page.1-58488-837-7 1-58488-836-9 Includes bibliographical references.Cover; Dedication; Contents; List of Figures; Symbol Description; Preface; Part I: Preliminaries; Chapter 1: Mathematical background; Chapter 2: Basics on complexity; Chapter 3: Cryptology: An introduction; Part II: Public-Key Encryption; Chapter 4: Provable security guarantees; Chapter 5: Public-key encryption in the standard model; Chapter 6: Public-key encryption using infinite groups; Part III: Secret-Key Encryption; Chapter 7: Block ciphers; Chapter 8: Cryptographic hash functions and message authentication codes; Part IV: Other Cryptographic ConstructionsChapter 9: Key establishment protocolsChapter 10: Signature and identification schemes; Part V: Appendix; Appendix A: Solutions to selected exercises; ReferencesGroup theoretic problems appear to be the most promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using nonabelian groups in the field of cryptography. It provides an introduction to cryptography (mostly asymmetric) with a focus on group theoretic constructions, making it the first book to use this approach. The authors include all of the needed cryptographic and group theoretic concepts. They supply exercises at the end of each chapter, selected solutions in the back of the book, and suggestions for studentChapman & Hall/CRC cryptography and network security.CryptographyData encryption (Computer science)Computer networksSecurity measuresCryptography.Data encryption (Computer science)Computer networksSecurity measures.005.82González Vasco Maria Isabel1246436Steinwandt RainerVasco Maria Isabel GonzalezFlBoTFGFlBoTFGBOOK9910788023603321Group theoretic cryptography3823540UNINA