|
Showing 1 - 22 of
22 matches in All Departments
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
This book constitutes the refereed proceedings of the 5th
International Conference on Applied Cryptography and Network
Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31
revised full papers cover signature schemes, computer and network
security, cryptanalysis, group-oriented security, cryptographic
protocols, anonymous authentication, identity-based cryptography,
and security in wireless, ad-hoc, and peer-to-peer networks.
This third volume of the catalogue contains descriptive entries for over five hundred manuscripts of Sanskrit hymnic and devotional poems, running to nearly seven hundred separate compositions in manuscripts running from the sixteenth to the nineteenth century. This important genre of classical Indian literature is valuable not only for its intrinsic poetic and aesthetic merits but also as a vital source of information for the history of Indian religion and its numerous traditions and affiliations. The collection includes works of famous devotional poets and philosophers as well as nearly two hundred compositions whose authors are unknown including some for which there are no other known available manuscripts in any other libraries. Professor Aithal is an internationally renowned expert in the field, and his descriptions include details of scribal and palaeographic features; his useful introduction outlines the literary genre and the principles of its classification.
The arrival in 1909 of the library of manuscripts now known as the
Chandra Shum Shere collection increased by well over six thousand
the already substantial holdings of the Bodleian and Indian
Institute libraries, and made Oxford the repository of the largest
known collection of Sanskrit manuscripts outside the Indian
subcontinent. It is a huge and uniquely valuable collection of
paper and palm leaf manuscripts, purchased for Oxford University by
Sir Chandra Shum Shere, the then Prime Minister of Nepal. The
General Editor of the catalogue of the collection is Dr Jonathan
Katz, Consultant to the Oriental Department of the Bodleian
Library, formerly Librarian of the Indian Institute, and present
Master of the Queen's Scholars at Westminster School.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R3,064
Discovery Miles 30 640
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R3,082
Discovery Miles 30 820
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R3,058
Discovery Miles 30 580
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,667
Discovery Miles 16 670
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R3,454
Discovery Miles 34 540
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,661
Discovery Miles 16 610
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback, 1st ed. 2022)
Shlomi Dolev, Jonathan Katz, Amnon Meisels
|
R2,580
Discovery Miles 25 800
|
Ships in 12 - 17 working days
|
This book constitutes the refereed proceedings of the 6th
International Symposium on Cyber Security Cryptography and Machine
Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July
2022. The 24 full and 11 short papers presented together with a
keynote paper in this volume were carefully reviewed and selected
from 53 submissions. They deal with the theory, design, analysis,
implementation, or application of cyber security, cryptography and
machine learning systems and networks, and conceptually innovative
topics in these research areas.
This book constitutes the refereed proceedings of the 18th
International Conference on Practice and Theory in Public-Key
Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in
March/April 2015. The 36 papers presented in this volume were
carefully reviewed and selected from 118 submissions. They are
organized in topical sections named: public-key encryption; e-cash;
cryptanalysis; digital signatures; password-based authentication;
pairint-based cryptography; efficient constructions; cryptography
with imperfect keys; interactive proofs; lattice-based
cryptography; and identity-based, predicate, and functional
encryption.
The Chandra Shum Shere Collection, which arrived in Oxford from
Varanasi over a century ago, is one of the largest Indian
manuscript libraries in the world outside the Subcontinent. Part IV
of this descriptive catalogue adds much to our knowledge of the
collection as a whole and gives details of nearly 900 manuscripts
in the field of Vedic literature, a fine and varied corpus of
Sanskrit primary texts and commentaries. There are some indications
that the original owner of this collection was a ritualist with
interests both in sacrificial practice and in traditional Vedic
scholarship. This element of the collection brings the published
catalogue records near to the half-way point, and other subject
volumes are present in preparation. Catalogue entries give full
information of the coverage of the nature and extent of the texts,
materials, scripts, scribes, dates and places of writing, and
former owners of the manuscripts.
|
Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Paperback, 2011 ed.)
John S. Baras, Jonathan Katz, Eitan Altman
|
R1,910
Discovery Miles 19 100
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second
International Conference on Decision and Game Theory for Security,
GameSec 2011, held in College Park, Maryland, USA, in November
2011. The 16 revised full papers and 2 plenary keynotes presented
were carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on attacks, adversaries,
and game theory, wireless adhoc and sensor networks, network games,
security insurance, security and trust in social networks and
security investments.
Cloud services have revolutionized computing in the modern world.
In an increasingly networked ecosystem, it is commonplace for
enterprises and private parties alike to leverage cloud services
for storage and compute. The most obvious benefits include
scalability, increased availability, and the potential for reduced
costs when compared to lower-scale on premise infrastructures. In
addition, cloud-hosted data (and compute) is accessible across
platforms and is not limited by geographical constraints making
collaboration attractively viable. However, the benefits of
outsourcing data and computation come with security and privacy
concerns. This monograph explores the advances in cloud security
research across both industry and academia, with a special focus on
secure infrastructure, services and storage. Besides overviewing
the state of the art, the monograph highlights open problems, and
possible future research directions. Cloud security is a broad
topic encompassing concepts from a large cross section of domains.
To make this monograph concise and meaningful, several topics and
challenges that are almost entirely specific to clouds are covered.
For this reason, general computing security topics such as
intrusion detection, software protection, phishing etc. are
excluded. While these are important building blocks that need to be
considered in an end-to-end cloud-centric design, they have been
extensively addressed elsewhere. The publication is divided into
three parts based on a broad clustering into hardware, computation,
and storage. The monograph should appeal to researchers, students
and professionals who work on Cloud Computing in general, and Cloud
Security specifically.
Now the most used texbook for introductory cryptography courses in
both mathematics and computer science, the Third Edition builds
upon previous editions by offering several new sections, topics,
and exercises. The authors present the core principles of modern
cryptography, with emphasis on formal definitions, rigorous proofs
of security.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
The Car
Arctic Monkeys
CD
R383
Discovery Miles 3 830
|