0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

Pseudorandomness and Cryptographic Applications (Paperback) Loot Price: R2,776
Discovery Miles 27 760
Pseudorandomness and Cryptographic Applications (Paperback): Michael Luby

Pseudorandomness and Cryptographic Applications (Paperback)

Michael Luby

Series: Princeton Computer Science Notes

 (sign in to rate)
Loot Price R2,776 Discovery Miles 27 760 | Repayment Terms: R260 pm x 12*

Bookmark and Share

Expected to ship within 18 - 22 working days

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack.

There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average.

The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.

General

Imprint: Princeton University Press
Country of origin: United States
Series: Princeton Computer Science Notes
Release date: February 1996
First published: 1996
Authors: Michael Luby
Dimensions: 254 x 197 x 14mm (L x W x T)
Format: Paperback - Trade
Pages: 248
ISBN-13: 978-0-691-02546-9
Categories: Books > Computing & IT > General theory of computing > Mathematical theory of computation
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Promotions
LSN: 0-691-02546-0
Barcode: 9780691025469

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,140 Discovery Miles 21 400

See more

Partners