03783oam 2200805I 450 991096100500332120240402054706.097810400684721040068472978042913660304291366099781466527232146652723410.1201/b18272(CKB)2670000000607459(EBL)1619960(SSID)ssj0001505392(PQKBManifestationID)11945179(PQKBTitleCode)TC0001505392(PQKBWorkID)11489780(PQKB)10202175(SSID)ssj0001542742(PQKBManifestationID)16131576(PQKBTitleCode)TC0001542742(PQKBWorkID)14791858(PQKB)11442084(MiAaPQ)EBC1619960(OCoLC)906180651(PPN)189405880(CaSebORM)9781584888369(EXLCZ)99267000000060745920180331h20152015 uy 0engur|n|---|||||txtccrGroup theoretic cryptography /Maria Isabel Gonzalez Vasco, Universidad Rey Juan Carlos, Madrid, Spain, Rainer Steinwandt, Florida Atlantic University, Boca Raton, FL1st ed.Boca Raton, Florida :CRC Press,[2015]©20151 online resource (244 p.)Chapman and Hall/CRC Cryptography and Network SecurityA Chapman and Hall book--Title page.9781584888376 1584888377 9781584888369 1584888369 Includes bibliographical references.Cover; Dedication; Contents; List of Figures; Symbol Description; Preface; Part I: Preliminaries; Chapter 1: Mathematical background; Chapter 2: Basics on complexity; Chapter 3: Cryptology: An introduction; Part II: Public-Key Encryption; Chapter 4: Provable security guarantees; Chapter 5: Public-key encryption in the standard model; Chapter 6: Public-key encryption using infinite groups; Part III: Secret-Key Encryption; Chapter 7: Block ciphers; Chapter 8: Cryptographic hash functions and message authentication codes; Part IV: Other Cryptographic ConstructionsChapter 9: Key establishment protocolsChapter 10: Signature and identification schemes; Part V: Appendix; Appendix A: Solutions to selected exercises; ReferencesGroup theoretic problems appear to be the most promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using nonabelian groups in the field of cryptography. It provides an introduction to cryptography (mostly asymmetric) with a focus on group theoretic constructions, making it the first book to use this approach. The authors include all of the needed cryptographic and group theoretic concepts. They supply exercises at the end of each chapter, selected solutions in the back of the book, and suggestions for studentChapman & Hall/CRC cryptography and network security.CryptographyData encryption (Computer science)Computer networksSecurity measuresCryptography.Data encryption (Computer science)Computer networksSecurity measures.005.82005.8González Vasco Maria Isabel1246436Steinwandt RainerVasco Maria Isabel GonzalezFlBoTFGFlBoTFGBOOK9910961005003321Group theoretic cryptography4328461UNINA