LEADER 03852nam 2200601 450 001 9910465192303321 005 20200520144314.0 010 $a1-60807-146-4 035 $a(CKB)2560000000254519 035 $a(EBL)1531534 035 $a(SSID)ssj0001437300 035 $a(PQKBManifestationID)12617734 035 $a(PQKBTitleCode)TC0001437300 035 $a(PQKBWorkID)11463847 035 $a(PQKB)11619439 035 $a(MiAaPQ)EBC1531534 035 $a(Au-PeEL)EBL1531534 035 $a(CaPaEBR)ebr11069349 035 $a(OCoLC)905527314 035 $a(CaBNVSL)mat09106149 035 $a(IEEE)9106149 035 $a(EXLCZ)992560000000254519 100 $a20200730d2011 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aContemporary Cryptography 205 $aSecond edition. 210 1$aNorwood :$cArtech House,$d2011. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2011] 215 $a1 online resource (598 p.) 225 1 $aArtech House information security and privacy series 300 $aDescription based upon print version of record. 311 $a1-60807-145-6 320 $aIncludes bibliographical references and index. 327 $aContemporary Cryptography Second Edition; Contents; Foreword; Preface; Acknowledgments; Chapter 1 Introduction; 1.1 CRYPTOLOGY; 1.2 CRYPTOGRAPHIC SYSTEMS; 1.2.1 Classes of Cryptographic Systems; 1.2.2 Secure Cryptographic Systems; 1.2.3 Real Security of Secure Cryptosystems; 1.3 HISTORICAL BACKGROUND INFORMATION; 1.4 OUTLINE OF THE BOOK; References; Chapter 2 Cryptographic Systems; 2.1 UNKEYED CRYPTOSYSTEMS; 2.1.1 One-Way Functions; 2.1.2 Cryptographic Hash Functions; 2.1.3 Random Bit Generators; 2.2 SECRET KEY CRYPTOSYSTEMS; 2.2.1 Symmetric Encryption Systems. 327 $a2.2.2 Message Authentication Codes2.2.3 PRBGs; 2.2.4 PRFs; 2.3 PUBLIC KEY CRYPTOSYSTEMS; 2.3.1 Asymmetric Encryption Systems; 2.3.2 DSSs; 2.3.3 Key Agreement; 2.3.4 Entity Authentication; 2.3.5 Secure Multiparty Computation; 2.4 FINAL REMARKS; References; Part I UNKEYED CRYPTOSYSTEMS; Chapter 3 One-Way Functions; 3.1 INTRODUCTION; 3.2 CANDIDATE ONE-WAY FUN. 330 $aWhether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you an in-depth understanding of essential tools and applications to help you with your daily work. The second edition has been reorganized and expanded, providing mathematical fundamentals and important cryptography principles in the appropriate appendixes, rather than summarized at the beginning of the book. Now you find all the details you need to fully master the material in the relevant sections. This allows you to quickly delve into the practical information you need for your projects. Covering unkeyed, secret key, and public key cryptosystems, this authoritative reference gives you solid working knowledge of the latest and most critical concepts, techniques, and systems in contemporary cryptography. Additionally, the book is supported with over 720 equations, more than 60 illustrations, and numerous time-saving URLs that connect you to websites with related information. 410 0$aArtech House information security and privacy series. 606 $aCryptography 608 $aElectronic books. 615 0$aCryptography. 676 $a005.82 700 $aOppliger$b Rolf$0906466 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910465192303321 996 $aContemporary Cryptography$92254039 997 $aUNINA