|
|
Showing 1 - 21 of
21 matches in All Departments
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
This book constitutes the refereed proceedings of the 5th
International Conference on Applied Cryptography and Network
Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31
revised full papers cover signature schemes, computer and network
security, cryptanalysis, group-oriented security, cryptographic
protocols, anonymous authentication, identity-based cryptography,
and security in wireless, ad-hoc, and peer-to-peer networks.
This third volume of the catalogue contains descriptive entries for over five hundred manuscripts of Sanskrit hymnic and devotional poems, running to nearly seven hundred separate compositions in manuscripts running from the sixteenth to the nineteenth century. This important genre of classical Indian literature is valuable not only for its intrinsic poetic and aesthetic merits but also as a vital source of information for the history of Indian religion and its numerous traditions and affiliations. The collection includes works of famous devotional poets and philosophers as well as nearly two hundred compositions whose authors are unknown including some for which there are no other known available manuscripts in any other libraries. Professor Aithal is an internationally renowned expert in the field, and his descriptions include details of scribal and palaeographic features; his useful introduction outlines the literary genre and the principles of its classification.
The arrival in 1909 of the library of manuscripts now known as the
Chandra Shum Shere collection increased by well over six thousand
the already substantial holdings of the Bodleian and Indian
Institute libraries, and made Oxford the repository of the largest
known collection of Sanskrit manuscripts outside the Indian
subcontinent. It is a huge and uniquely valuable collection of
paper and palm leaf manuscripts, purchased for Oxford University by
Sir Chandra Shum Shere, the then Prime Minister of Nepal. The
General Editor of the catalogue of the collection is Dr Jonathan
Katz, Consultant to the Oriental Department of the Bodleian
Library, formerly Librarian of the Indian Institute, and present
Master of the Queen's Scholars at Westminster School.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,522
Discovery Miles 15 220
|
Ships in 18 - 22 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,517
Discovery Miles 15 170
|
Ships in 18 - 22 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R2,792
Discovery Miles 27 920
|
Ships in 18 - 22 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R2,776
Discovery Miles 27 760
|
Ships in 18 - 22 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R2,771
Discovery Miles 27 710
|
Ships in 18 - 22 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R3,126
Discovery Miles 31 260
|
Ships in 18 - 22 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
This book constitutes the refereed proceedings of the 18th
International Conference on Practice and Theory in Public-Key
Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in
March/April 2015. The 36 papers presented in this volume were
carefully reviewed and selected from 118 submissions. They are
organized in topical sections named: public-key encryption; e-cash;
cryptanalysis; digital signatures; password-based authentication;
pairint-based cryptography; efficient constructions; cryptography
with imperfect keys; interactive proofs; lattice-based
cryptography; and identity-based, predicate, and functional
encryption.
|
Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback, 1st ed. 2022)
Shlomi Dolev, Jonathan Katz, Amnon Meisels
|
R2,497
Discovery Miles 24 970
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 6th
International Symposium on Cyber Security Cryptography and Machine
Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July
2022. The 24 full and 11 short papers presented together with a
keynote paper in this volume were carefully reviewed and selected
from 53 submissions. They deal with the theory, design, analysis,
implementation, or application of cyber security, cryptography and
machine learning systems and networks, and conceptually innovative
topics in these research areas.
The Chandra Shum Shere Collection, which arrived in Oxford from
Varanasi over a century ago, is one of the largest Indian
manuscript libraries in the world outside the Subcontinent. Part IV
of this descriptive catalogue adds much to our knowledge of the
collection as a whole and gives details of nearly 900 manuscripts
in the field of Vedic literature, a fine and varied corpus of
Sanskrit primary texts and commentaries. There are some indications
that the original owner of this collection was a ritualist with
interests both in sacrificial practice and in traditional Vedic
scholarship. This element of the collection brings the published
catalogue records near to the half-way point, and other subject
volumes are present in preparation. Catalogue entries give full
information of the coverage of the nature and extent of the texts,
materials, scripts, scribes, dates and places of writing, and
former owners of the manuscripts.
|
Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Paperback, 2011 ed.)
John S. Baras, Jonathan Katz, Eitan Altman
|
R1,740
Discovery Miles 17 400
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the Second
International Conference on Decision and Game Theory for Security,
GameSec 2011, held in College Park, Maryland, USA, in November
2011. The 16 revised full papers and 2 plenary keynotes presented
were carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on attacks, adversaries,
and game theory, wireless adhoc and sensor networks, network games,
security insurance, security and trust in social networks and
security investments.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.
Table of Contents
I Introduction and Classical Cryptography
1. Introduction
Cryptography and Modern Cryptography
The Setting of Private-Key Encryption
Historical Ciphers and Their Cryptanalysis
Principles of Modern Cryptography
Principle 1 - Formal Definitions
Principle 2 - Precise Assumptions
Principle 3 - Proofs of Security
Provable Security and Real-World Security
References and Additional Reading
Exercises
2. Perfectly Secret Encryption
Definitions
The One-Time Pad
Limitations of Perfect Secrecy
*Shannon's Theorem
References and Additional Reading
Exercises
II Private-Key (Symmetric) Cryptography
3. Private-Key Encryption
Computational Security
The Concrete Approach
The Asymptotic Approach
Defining Computationally Secure Encryption
The Basic Definition of Security (EAV-Security)
*Semantic Security
Constructing an EAV-Secure Encryption Scheme
Pseudorandom Generators
Proofs by Reduction
EAV-Security from a Pseudorandom Generator
Stronger Security Notions
Security for Multiple Encryptions
Chosen-Plaintext Attacks and CPA-Security
CPA-Security for Multiple Encryptions
Constructing a CPA-Secure Encryption Scheme
Pseudorandom Functions and Permutations
CPA-Security from a Pseudorandom Function
Modes of Operation and Encryption in Practice
Stream Ciphers
Stream-Cipher Modes of Operation
Block Ciphers and Block-Cipher Modes of Operation
*Nonce-Based Encryption
References and Additional Reading
Exercises
4. Message Authentication Codes
Message Integrity
Secrecy vs Integrity
Encryption vs Message Authentication
Message Authentication Codes (MACs) - Definitions
Constructing Secure Message Authentication Codes
A Fixed-Length MAC
Domain Extension for MACs
CBC-MAC
The Basic Construction
*Proof of Security
GMAC and Poly
MACs from Difference-Universal Functions
Instantiations
*Information-Theoretic MACs
One-Time MACs from Strongly Universal Functions
One-Time MACs from Difference-Universal Functions
Limitations on Information-Theoretic MACs
References and Additional Reading
Exercises
5. CCA-Security and Authenticated Encryption
Chosen-Ciphertext Attacks and CCA-Security
Padding-Oracle Attacks
Defining CCA-Security
Authenticated Encryption
Defining Authenticated Encryption
CCA Security vs Authenticated Encryption
Authenticated Encryption Schemes
Generic Constructions
Standardized Schemes
Secure Communication Sessions
References and Additional Reading
Exercises
6. Hash Functions and Applications
Definitions
Collision Resistance
Weaker Notions of Security
Domain Extension: The Merkle-Damgard Transform
Message Authentication Using Hash Functions
Hash-and-MAC
HMAC
Generic Attacks on Hash Functions
Birthday Attacks for Finding Collisions
Small-Space Birthday Attacks
*Time/Space Tradeo s for Inverting Hash Functions
The Random-Oracle Model
The Random-Oracle Model in Detail
Is the Random-Oracle Methodology Sound?
Additional Applications of Hash Functions
Fingerprinting and Deduplication
Merkle Trees
Password Hashing
Key Derivation
Commitment Schemes
References and Additional Reading
Exercises
7. Practical Constructions of Symmetric-Key Primitives
Stream Ciphers
Linear-Feedback Shift Registers
Adding Nonlinearity
Trivium
RC4
ChaCha20
Block Ciphers
Substitution-Permutation Networks
Feistel Networks
DES - The Data Encryption Standard
3 DES: Increasing the Key Length of a Block Cipher
AES -The Advanced Encryption Standard
*Differential and Linear Cryptanalysis
Compression Functions and Hash Functions
Compression Functions from Block Ciphers
MD5, SHA-1, and SHA-2
The Sponge Construction and SHA-3 (Keccak)
References and Additional Reading
Exercises
8. *Theoretical Constructions of Symmetric-Key Primitives
One-Way Functions
Definitions
Candidate One-Way Functions
Hard-Core Predicates
From One-Way Functions to Pseudorandomness
Hard-Core Predicates from One-Way Functions
A Simple Case
A More Involved Case
The Full Proof
Constructing Pseudorandom Generators
Pseudorandom Generators with Minimal Expansion
Increasing the Expansion Factor
Constructing Pseudorandom Functions
Constructing (Strong) Pseudorandom Permutations
Assumptions for Private-Key Cryptography
Computational Indistinguishability
References and Additional Reading
Exercises
III Public-Key (Asymmetric) Cryptography
9. Number Theory and Cryptographic Hardness Assumptions
Preliminaries and Basic Group Theory
Primes and Divisibility
Modular Arithmetic
Groups
The Group ZN
*Isomorphisms and the Chinese Remainder Theorem
Primes, Factoring, and RSA
Generating Random Primes
*Primality Testing
The Factoring Assumption
The RSA Assumption
*Relating the Factoring and RSA Assumptions
Cryptographic Assumptions in Cyclic Groups
Cyclic Groups and Generators
The Discrete-Logarithm/Diffie-Hellman Assumptions
Working in (Subgroups of) Zp
Elliptic Curves
*Cryptographic Applications
One-Way Functions and Permutations
Collision-Resistant Hash Functions
References and Additional Reading
Exercises
10. *Algorithms for Factoring and Computing Discrete Logarithms
Algorithms for Factoring
Pollard's p - Algorithm
Pollard's Rho Algorithm
The Quadratic Sieve Algorithm
Generic Algorithms for Computing Discrete Logarithms
The Pohlig-Hellman Algorithm
The Baby-Step/Giant-Step Algorithm
Discrete Logarithms from Collisions
Index Calculus: Computing Discrete Logarithms in Zp
Recommended Key Lengths
References and Additional Reading
Exercises
11. Key Management and the Public-Key Revolution
Key Distribution and Key Management
A Partial Solution: Key-Distribution Centers
Key Exchange and the Diffie-Hellman Protocol
The Public-Key Revolution
References and Additional Reading
Exercises
12. Public-Key Encryption
Public-Key Encryption - An Overview
Definitions
Security against Chosen-Plaintext Attacks
Multiple Encryptions
Security against Chosen-Ciphertext Attacks
Hybrid Encryption and the KEM/DEM Paradigm
CPA-Security
CCA-Security
CDH/DDH-Based Encryption
El Gamal Encryption
DDH-Based Key Encapsulation
*A CDH-Based KEM in the Random-Oracle Model
*Chosen-Ciphertext Security and DHIES/ECIES
RSA-Based Encryption
Plain RSA Encryption
Padded RSA and PKCS # v
*CPA-Secure Encryption without Random Oracles
OAEP and PKCS # v
*A CCA-Secure KEM in the Random-Oracle Model
RSA Implementation Issues and Pitfalls
References and Additional Reading
Exercises
13. Digital Signature Schemes
Digital Signatures - An Overview
Definitions
The Hash-and-Sign Paradigm
RSA-Based Signatures
Plain RSA Signatures
RSA-FDH and PKCS #1 Standards
Signatures from the Discrete-Logarithm Problem
Identification Schemes and Signatures
The Schnorr Identification/Signature Schemes
DSA and ECDSA
Certificates and Public-Key Infrastructures
Putting It All Together { TLS
*Signcryption
References and Additional Reading
Exercises
14. *Post-Quantum Cryptography
Post-Quantum Symmetric-Key Cryptography
Grover's Algorithm and Symmetric-Key Lengths
Collision-Finding Algorithms and Hash Functions
Shor's Algorithm and its Impact on Cryptography
Post-Quantum Public-Key Encryption
Post-Quantum Signatures
Lamport's Signature Scheme
Chain-Based Signatures
Tree-Based Signatures
References and Additional Reading
Exercises
15. *Advanced Topics in Public-Key Encryption
Public-Key Encryption from Trapdoor Permutations
Trapdoor Permutations
Public-Key Encryption from Trapdoor Permutations
The Paillier Encryption Scheme
The Structure of Z_N
The Paillier Encryption Scheme
Homomorphic Encryption
Secret Sharing and Threshold Encryption
Secret Sharing
Verifiable Secret Sharing
Threshold Encryption and Electronic Voting
The Goldwasser-Micali Encryption Scheme
Quadratic Residues Modulo a Prime
Quadratic Residues Modulo a Composite
The Quadratic Residuosity Assumption
The Goldwasser-Micali Encryption Scheme
The Rabin Encryption Scheme
Computing Modular Square Roots
A Trapdoor Permutation Based on Factoring
The Rabin Encryption Scheme
References and Additional Reading
Exercises
Index of Common Notation
Appendix A Mathematical Background
A Identities and Inequalities
A Asymptotic Notation
A Basic Probability
A The \Birthday" Problem
A *Finite Fields
Appendix B Basic Algorithmic Number Theory
B Integer Arithmetic
B Basic Operations
B The Euclidean and Extended Euclidean Algorithms
B Modular Arithmetic
B Basic Operations
B Computing Modular Inverses
B Modular Exponentiation
B *Montgomery Multiplication
B Choosing a Uniform Group Element
B *Finding a Generator of a Cyclic Group
B Group-Theoretic Background
B Efficient Algorithms
References and Additional Reading
Exercises
/
Before, During, and After Stonewall: 100 Years of Heroes and
History The Right Side of History tells the 100-year history of
queer activism in a series of revealing close-ups, first-person
accounts, and intimate snapshots of LGBT pioneers and radicals.
This diverse cast stretches from the Edwardian period to today,
including first-person accounts of the key protest that is at the
heart of the 2015 movie Stonewall. The book shows how LGBT folk
have always been in the forefront of progressive social evolution
in the United States. It references heroes like Abraham Lincoln,
Eleanor Roosevelt, Bayard Rustin, Harvey Milk, and Edie Windsor.
Equally, the book honors names that aren't in history books, from
participants in the Names Project, a national phenomenon
memorializing 94,000 AIDS victims, to underground artists and
writers.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|