Modern Cryptography with Proof Techniques and Implementations
Modern Cryptography with Proof Techniques and Implementations
Oun Hwang, Seong; Kim, Intae; Lee, Wai Kong
Taylor & Francis Ltd
03/2021
510
Dura
Inglês
9781138584082
15 a 20 dias
848
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.
1. History of Cryptography.
2. Overview of Provable Security.
3. Private Key Encryption.
4. Message Authentication Code.
5. Hash Function.
6. Public Key Cryptography.
7. Digital Signature.
8. Protocols.
Part 2: Fundamentals of IBE.
9. First Provable IBE (Boneh-Franklin).
10. Selective Security IBE (Boneh-Boyen).
11. Tight Security IBE (Gentry IBE).
12. Dual System Encryption (Waters).
13. Hierarchical IBE (Allison-Waters).
14. Broadcast Encryption.
15. Identity Based Signature.
16. Transformation Techniques.
Part 3: Advanced IBE.
17. Key Policy-Attribute Based Encryption.
18. Ciphertext Policy-Attribute Based Encryption.
19. Predicate Encryption.
20. Functional Encryption.
21. Searchable Encryption.
Part 4: Future Cryptography.
22. Certificate Based Cryptography.
23. Certificate-Less Cryptography.
24. Homomorphic Encryption.
25. Post Quantum Cryptography.
26. Blockchain Applications.