Muutke küpsiste eelistusi

Introduction to Public Key Cryptography [Kõva köide]

(University of Electronic Science and Technology of China)
  • Formaat: Hardback, 350 pages, kõrgus x laius: 234x156 mm
  • Ilmumisaeg: 01-Jan-2025
  • Kirjastus: CRC Press
  • ISBN-10: 1138708763
  • ISBN-13: 9781138708761
Introduction to Public Key Cryptography
  • Formaat: Hardback, 350 pages, kõrgus x laius: 234x156 mm
  • Ilmumisaeg: 01-Jan-2025
  • Kirjastus: CRC Press
  • ISBN-10: 1138708763
  • ISBN-13: 9781138708761

In addition to laying the foundation for today’s online security industry, PKC made encryption technologies accessible to individuals and companies. In view of the many achievements of PKC, it should be accessible to most people. Yet, it is difficult to get a unified account of the evolution of PKC from the scattered literature. It is precisely this gap that this book fills. It covers all the important research directions behind PKC that have been proposed to date, including provable security, implementation, and the state-of-the-art applications such as attribute-based cryptography.

Part 1: Setting the Stage.
1. Introduction.
2. Mathematical Concepts and Provable Security. Part 2: Principles.
3. Public Key Encryption.
4. Digital Signature.
5. ID-based Cryptosystem. Part 3: State-of-the-Art.
6. Attribute-based Cryptosystem.
7. Searchable Public Key Cryptography.
8. Avoiding the Key Escrow. Part 4: Implementations. 9. PBC Library.
10. Example Implementations. Part 5: Applications.
11. Security Issues in Cloud Computing.
12. Network Security in IoT.
Dr. Xiong is an associate professor in the School of Information and Software Engineering, University of Electronic Science and Technology of China (UESTC). Dr. Xiong has been sponsored by several R+D funds to conduct his research in the field of applied cryptography and network security from Chinese government or the other academic agencies in China, and authored over 60 publications in the high quality international journals and conferences. He served in the review process of dozens of international journals on information security.