This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…
Contents: 1. Basics of cryptography; 2. Complexity theory; 3. Non-deterministic computation; 4. Probabilistic computation; 5. Symmetric cryptosystems; 6. One-way functions; 7. Public key cryptography; 8. Digital signatures; 9. Key establishment protocols; 10. Secure encryption; 11. Identification schemes; Appendix 1; Appendix 2; Appendix 3; Appendix 4; Appendix …
Table of contents : Introduction Security for Signcryption: The Two-User Model Security for Signcryption: The Multi-User Model Signcryption Schemes Based on the Diffie–Hellman Problem Signcryption Schemes Based on Bilinear Maps Signcryption Schemes Based on the RSA Problem Hybrid Signcryption Concealment and Its Applications to Authenticated Encryption Parallel Signcryption Identit…
Requirements on digital signature schemes History of digital signature schemes Information-theoretic security for signers: Introduction Terminology Properties of digital signature schemes Overview of existing schemes with other than ordinary security Conventional definitions of fail-stop signature schemes and general reductions Building blocks Constructions for one message block Signin…
Contents: Introduction. Part One: Exploring the World of Covert Communication. Chapter 1: Covert Communication: It’s All Around You. Chapter 2:” Cryptography Explained. Chapter 3 :Hiding the Goods with Steganography. Chapter 4: Digital Watermarking. Part Two: The Hidden Realm of Steganography. Chapter 5: Steganography at Large. Chapter 6: Nuts and Bolts of…
Contents: Chapter 1: A History of Cryptography 1 Chapter 2: Large Integer Computing 33 Chapter 3: The Integers 65 Chapter 4: Linear Diophantine Equations and Linear Congruences 89 Chapter 5: Linear Ciphers 105 Chapter 6: Systems of Linear Congruences—Single Modulus 125 Chapter 7: Matrix Ciphers 143 Chapter 8: Systems of Linear Congruences—Multiple Moduli 161 Chapter 9: Quadrati…
Contents: Chapter 1: The JCA and the JCE Chapter 2: Symmetric Key Cryptography Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chap…
Contents: 1 Introduction 2 Number Formats: The Representation of Large Numbers in C 3 Interface Semantics 4 The Fundamental Operations 5 Modular Arithmetic: Calculating with Residue Classes 6 Where All RoadsMeet:Modular Exponentiation 7 Bitwise and Logical Functions 8 Input, Output, Assignment, Conversion 9 Dynamic Registers 10 Basic Number-Theoretic Functions 11 Rijndael: …
Preface Quantum Cryptographic Protocols and Quantum Security (Laszlo Gyongyosi, Sandor Imre, Department of Telecommunications, Budapest University of Technology and Economics, Budapest, Hungary) Low-Cost Mutual Authentication Protocols (Mu’awya Naser, Pedro Peris-Lopez, Mohammad Rafie, Rahmat Budiarto, School of Computer Sciences, Unvirisity Sinas Malaysia, Pinang, Malaysia, and other…