Modern Cryptography with Proof Techniques and Implementations

個数:
電子版価格
¥10,447
  • 電子版あり

Modern Cryptography with Proof Techniques and Implementations

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 510 p.
  • 言語 ENG
  • 商品コード 9781138584082
  • DDC分類 005.824

Full Description

Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes.

Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning.

Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks.

Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 - 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.

Contents

Part 1: Foundations of Cryptography.

1. History of Cryptography.

2. Overview of Provable Security.

3. Private Key Encryption.

4. Message Authentication Code.

5. Hash Function.

6. Public Key Cryptography.

7. Digital Signature.

8. Protocols.

Part 2: Fundamentals of IBE.

9. First Provable IBE (Boneh-Franklin).

10. Selective Security IBE (Boneh-Boyen).

11. Tight Security IBE (Gentry IBE).

12. Dual System Encryption (Waters).

13. Hierarchical IBE (Allison-Waters).

14. Broadcast Encryption.

15. Identity Based Signature.

16. Transformation Techniques.

Part 3: Advanced IBE.

17. Key Policy-Attribute Based Encryption.

18. Ciphertext Policy-Attribute Based Encryption.

19. Predicate Encryption.

20. Functional Encryption.

21. Searchable Encryption.

Part 4: Future Cryptography.

22. Certificate Based Cryptography.

23. Certificate-Less Cryptography.

24. Homomorphic Encryption.

25. Post Quantum Cryptography.

26. Blockchain Applications.

最近チェックした商品