LEADER 01748nas a2200385 i 4500 001 991002664669707536 005 20250609124549.0 008 011205m19219999us || | |eng 022 $a0162-1459 035 $ab11690926-39ule_inst 035 $aPERLE004899 080 $aCDU 311 082 04$a310.6 222 0$aJournal of the American Statistical Association 245 00$aJournal of the American Statistical Association /$cAmerican Statistical Association 246 10$aJASA 260 $a[New York] :$bAmerican statistical association,$c1922- 310 $aTrimestrale 362 0 $aVol.18, n.137 (March 1922)- 500 $aIl seguente Issn collegato a questa notizia è stato cancellato: 00031291. L'unico codice corrente è quello visualizzato nel campo ISSN 591 $aCodice CNR: P 00029166 592 $aLE025 1993-1999;2003-2011;2014; Lac. 1993-1995;1997;1999; 592 $aLE013 1970; 1975; 1977-1978; 1984 710 2 $aAmerican Statistical Association$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0102688 770 0 $tAuthor and subject index to volumes 50-86 (1955-1991)$x1-883-27600-4 776 0 $x1537-274X 780 00$aQuarterly publications of the American statistical association$x2326-6228 907 $a.b11690926$b01-10-19$c08-07-02 912 $a991002664669707536 945 $aLE013$g1$lle013$o-$pE0.00$q-$rn$so$t18$u0$v0$w0$x0$y.i11921146$z08-07-02 945 $aLE025$g1$lle025$on$pE0.00$q-$rn$so$t18$u0$v0$w0$x0$y.i15384585$z23-02-12 945 $aLE025$c2014$g1$lle025$on$pE614.26$q-$rn$s-$t0$u0$v0$w0$x0$y.i15653304$z14-01-15 996 $aJournal of the American Statistical Association$91746128 997 $aUNISALENTO 998 $ale013$ale025$b01-01-01$cs$da$e-$feng$gus$h0$i9 LEADER 02890nam 22005295 450 001 9910299459803321 005 20200929192406.0 010 $a3-319-93049-4 024 7 $a10.1007/978-3-319-93049-7 035 $a(CKB)4100000004974909 035 $a(MiAaPQ)EBC5438626 035 $a(DE-He213)978-3-319-93049-7 035 $a(PPN)229498183 035 $a(EXLCZ)994100000004974909 100 $a20180626d2018 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntroduction to Security Reduction /$fby Fuchun Guo, Willy Susilo, Yi Mu 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (262 pages) 311 $a3-319-93048-6 327 $aNotions, Definitions and Models -- Identity-Based Encryption -- Foundations of Group-Based Cryptography -- Foundations of Security Reduction -- Digital Signatures With Random Oracles -- Digital Signatures Without Random Oracles -- Public Key Encryption With Random Oracles -- Public Key Encryption Without Random Oracles -- Identity-Based Encryption With Random Oracles -- Identity-Based Encryption Without Random Oracles. 330 $aThis monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. 606 $aData structures (Computer science) 606 $aComputer security 606 $aData protection 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aData structures (Computer science) 615 0$aComputer security. 615 0$aData protection. 615 14$aData Structures and Information Theory. 615 24$aSystems and Data Security. 615 24$aSecurity. 676 $a005.82 700 $aGuo$b Fuchun$4aut$4http://id.loc.gov/vocabulary/relators/aut$0998011 702 $aSusilo$b Willy$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aMu$b Yi$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910299459803321 996 $aIntroduction to Security Reduction$92289012 997 $aUNINA