Full Description
This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.



