Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modern Cryptography: Theory and Practice

Buy
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need.

Coverage includes:

  • Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more
  • Authentication: basic techniques and principles vs. misconceptions and consequential attacks
  • Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos

Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions.

About the Author

WENBO MAO, PhD, is a Technical Contributor to the Trusted Systems Lab at Hewlett-Packard Laboratories, Bristol, UK. Mao leads HP's participation and research activities in Computer Aided Solutions to Secure Electronic Commerce Transactions (CASENET), a research project funded by the European Union. His research interests include cryptography, computer security, and formal methods. He is a member of the International Association for Cryptographic Research (IACR), the Institute of Electrical and Electronics Engineers (IEEE), and the British Computer Society (BCS).

(HTML tags aren't allowed.)

Linux and Solaris Recipes for Oracle DBAs
Linux and Solaris Recipes for Oracle DBAs

Linux and Solaris Recipes for Oracle DBAs, 2nd Edition is an example–based book on managing Oracle Database under Linux and Solaris. The book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a stack of operating-system documentation. What this book provides...

New Perspectives on Computer Concepts 2014: Comprehensive
New Perspectives on Computer Concepts 2014: Comprehensive

Go beyond computing basics with the award-winning NEW PERSPECTIVES ON COMPUTER CONCEPTS. Designed to get you up-to-speed on essential computer literacy skills, this market leading text goes deeper, providing technical and practical information relevant to everyday life. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2014 incorporates significant...

MATLAB for Engineers (ESource Series)
MATLAB for Engineers (ESource Series)

With a hands-on approach and focus on problem solving, this introduction to Matlab uses examples drawn from a range of engineering disciplines to demonstrate Matlab’s applications to a broad variety of problems....


Web Server Administration (Web Warrior Series)
Web Server Administration (Web Warrior Series)

Web Server Administration offers a comprehensive overview of the tools and techniques needed to succeed as a Web Server Administrator as well as the tasks they are expected to perform. This text provides and introduction to the basics of this job role, covers server installation, and then moves on to the installation, configuration, and...

Diagnostic Atlas of Common Eyelid Diseases
Diagnostic Atlas of Common Eyelid Diseases
For any clinician dealing with ophthalmic diseases, individual lesions of the eyelid and conjunctiva can be extremely confusing. From a practical perspective such lesions are either benign or malignant, and can be cystic or solid, melanotic or amelanotic. Certainly the most important diagnostic question is whether the lesion...
Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy