0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 24 of 24 matches in All Departments

Dante Beyond Borders - Contexts and Reception (Hardcover): Nick Havely, Jonathan Katz, Richard Cooper Dante Beyond Borders - Contexts and Reception (Hardcover)
Nick Havely, Jonathan Katz, Richard Cooper
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days
A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian... A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian Library: Part II. Epics and Puranas (Paperback)
John Brockington; Edited by (general) Jonathan Katz
R2,738 Discovery Miles 27 380 Ships in 10 - 15 working days

The arrival in 1909 of the library of manuscripts now known as the Chandra Shum Shere collection increased by well over six thousand the already substantial holdings of the Bodleian and Indian Institute libraries, and made Oxford the repository of the largest known collection of Sanskrit manuscripts outside the Indian subcontinent. It is a huge and uniquely valuable collection of paper and palm leaf manuscripts, purchased for Oxford University by Sir Chandra Shum Shere, the then Prime Minister of Nepal. The General Editor of the catalogue of the collection is Dr Jonathan Katz, Consultant to the Oriental Department of the Bodleian Library, formerly Librarian of the Indian Institute, and present Master of the Queen's Scholars at Westminster School.

A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian... A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian Library: Part I: Jyotihsastra (Paperback)
David Pingree; Edited by (general) Jonathan Katz
R1,984 Discovery Miles 19 840 Ships in 10 - 15 working days
Matchmaking in the Archive - 19 Conversations with the Dead and 3 Encounters with Ghosts (Paperback): E.G. Crichton, Chris... Matchmaking in the Archive - 19 Conversations with the Dead and 3 Encounters with Ghosts (Paperback)
E.G. Crichton, Chris Vargas, Jonathan Katz, Michelle Tea
R602 Discovery Miles 6 020 Ships in 10 - 15 working days
The Other Classical Musics - Fifteen Great Traditions (Hardcover): Michael Church The Other Classical Musics - Fifteen Great Traditions (Hardcover)
Michael Church; Contributions by Michael Church, Terry E. Miller, Neil Sorrell, David Hughes, …
R1,142 Discovery Miles 11 420 Ships in 10 - 15 working days

The Other Classical Musics offers challenging new perspectives on classical music by presenting the history of fifteen parallel traditions. Winner of the Royal Philharmonic Society Music Award for Creative Communication 2015 There is a treasure trove of underappreciated music out there; this book will convince many to explore it. The Economist Whatis classical music? This book answers the question in a manner never before attempted, by presenting the history of fifteen parallel traditions, of which Western classical music is just one. Each music is analysed in terms of itsmodes, scales, and theory; its instruments, forms, and aesthetic goals; its historical development, golden age, and condition today; and the conventions governing its performance. The writers are leading ethnomusicologists, and their approach is based on the belief that music is best understood in the context of the culture which gave rise to it. By including Mande and Uzbek-Tajik music - plus North American jazz - in addition to the better-knownstyles of the Middle East, the Indian sub-continent, the Far East, and South-East Asia, this book offers challenging new perspectives on the word 'classical'. It shows the extent to which most classical traditions are underpinnedby improvisation, and reveals the cognate origins of seemingly unrelated musics; it reflects the multifarious ways in which colonialism, migration, and new technology have affected musical development, and continue to do today. With specialist language kept to a minimum, it's designed to help both students and general readers to appreciate musical traditions which may be unfamiliar to them, and to encounter the reality which lies behind that lazy adjective'exotic'. MICHAEL CHURCH has spent much of his career in newspapers as a literary and arts editor; since 2010 he has been the music and opera critic of The Independent. From 1992 to 2005 he reported on traditional musics all over the world for the BBC World Service; in 2004, Topic Records released a CD of his Kazakh field recordings and, in 2007, two further CDs of his recordings in Georgia and Chechnya. Contributors: Michael Church, Scott DeVeaux, Ivan Hewett, David W. Hughes, Jonathan Katz, Roderic Knight, Frank Kouwenhoven, Robert Labaree, Scott Marcus, Terry E. Miller, Dwight F. Reynolds, Neil Sorrell, Will Sumits, Richard Widdess, Ameneh Youssefzadeh

Digital Signatures (Hardcover, 1st ed. 2010): Jonathan Katz Digital Signatures (Hardcover, 1st ed. 2010)
Jonathan Katz
R2,759 Discovery Miles 27 590 Ships in 10 - 15 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Digital Signatures (Paperback, 2010 ed.): Jonathan Katz Digital Signatures (Paperback, 2010 ed.)
Jonathan Katz
R2,653 Discovery Miles 26 530 Ships in 10 - 15 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings... Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (Paperback, 2007 ed.)
Jonathan Katz, Moti Yung
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revised full papers cover signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, and security in wireless, ad-hoc, and peer-to-peer networks.

A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian... A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian Library: Part III. Stotras (Paperback)
K. Parameswara Aithal; Edited by (general) Jonathan Katz
R5,942 Discovery Miles 59 420 Ships in 10 - 15 working days

This third volume of the catalogue contains descriptive entries for over five hundred manuscripts of Sanskrit hymnic and devotional poems, running to nearly seven hundred separate compositions in manuscripts running from the sixteenth to the nineteenth century. This important genre of classical Indian literature is valuable not only for its intrinsic poetic and aesthetic merits but also as a vital source of information for the history of Indian religion and its numerous traditions and affiliations. The collection includes works of famous devotional poets and philosophers as well as nearly two hundred compositions whose authors are unknown including some for which there are no other known available manuscripts in any other libraries. Professor Aithal is an internationally renowned expert in the field, and his descriptions include details of scribal and palaeographic features; his useful introduction outlines the literary genre and the principles of its classification.

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18,... Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18,... Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
R1,517 Discovery Miles 15 170 Ships in 10 - 15 working days

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,771 Discovery Miles 27 710 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,792 Discovery Miles 27 920 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,776 Discovery Miles 27 760 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18,... Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
R3,126 Discovery Miles 31 260 Ships in 10 - 15 working days

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (Paperback, 2015 ed.)
Jonathan Katz
R1,554 Discovery Miles 15 540 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 -... Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback, 1st ed. 2022)
Shlomi Dolev, Jonathan Katz, Amnon Meisels
R2,497 Discovery Miles 24 970 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022. The 24 full and 11 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 53 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

A Catalogue of the Chandra Shum Shere Collection in the Bodleian Library - Part IV: Veda. By K. Parameswara Aithal (Paperback):... A Catalogue of the Chandra Shum Shere Collection in the Bodleian Library - Part IV: Veda. By K. Parameswara Aithal (Paperback)
Parameswara Aithal; Edited by Jonathan Katz
R2,567 Discovery Miles 25 670 Ships in 10 - 15 working days

The Chandra Shum Shere Collection, which arrived in Oxford from Varanasi over a century ago, is one of the largest Indian manuscript libraries in the world outside the Subcontinent. Part IV of this descriptive catalogue adds much to our knowledge of the collection as a whole and gives details of nearly 900 manuscripts in the field of Vedic literature, a fine and varied corpus of Sanskrit primary texts and commentaries. There are some indications that the original owner of this collection was a ritualist with interests both in sacrificial practice and in traditional Vedic scholarship. This element of the collection brings the published catalogue records near to the half-way point, and other subject volumes are present in preparation. Catalogue entries give full information of the coverage of the nature and extent of the texts, materials, scripts, scribes, dates and places of writing, and former owners of the manuscripts.

Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA,... Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Paperback, 2011 ed.)
John S. Baras, Jonathan Katz, Eitan Altman
R1,740 Discovery Miles 17 400 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.

Lottery Of Intimacies (Paperback): Jonathan Katz Lottery Of Intimacies (Paperback)
Jonathan Katz
R513 Discovery Miles 5 130 Ships in 10 - 15 working days
Objects in Motion (Paperback): Jonathan Katz Objects in Motion (Paperback)
Jonathan Katz
R510 Discovery Miles 5 100 Ships in 10 - 15 working days
Introduction to Modern Cryptography (Hardcover, 3rd Edition): Jonathan Katz, Yehuda Lindell Introduction to Modern Cryptography (Hardcover, 3rd Edition)
Jonathan Katz, Yehuda Lindell
R3,247 Discovery Miles 32 470 Ships in 10 - 15 working days

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.

Table of Contents

I Introduction and Classical Cryptography

1. Introduction

Cryptography and Modern Cryptography

The Setting of Private-Key Encryption

Historical Ciphers and Their Cryptanalysis

Principles of Modern Cryptography

Principle 1 - Formal Definitions

Principle 2 - Precise Assumptions

Principle 3 - Proofs of Security

Provable Security and Real-World Security

References and Additional Reading

Exercises

2. Perfectly Secret Encryption

Definitions

The One-Time Pad

Limitations of Perfect Secrecy

*Shannon's Theorem

References and Additional Reading

Exercises

II Private-Key (Symmetric) Cryptography

3. Private-Key Encryption

Computational Security

The Concrete Approach

The Asymptotic Approach

Defining Computationally Secure Encryption

The Basic Definition of Security (EAV-Security)

*Semantic Security

Constructing an EAV-Secure Encryption Scheme

Pseudorandom Generators

Proofs by Reduction

EAV-Security from a Pseudorandom Generator

Stronger Security Notions

Security for Multiple Encryptions

Chosen-Plaintext Attacks and CPA-Security

CPA-Security for Multiple Encryptions

Constructing a CPA-Secure Encryption Scheme

Pseudorandom Functions and Permutations

CPA-Security from a Pseudorandom Function

Modes of Operation and Encryption in Practice

Stream Ciphers

Stream-Cipher Modes of Operation

Block Ciphers and Block-Cipher Modes of Operation

*Nonce-Based Encryption

References and Additional Reading

Exercises

4. Message Authentication Codes

Message Integrity

Secrecy vs Integrity

Encryption vs Message Authentication

Message Authentication Codes (MACs) - Definitions

Constructing Secure Message Authentication Codes

A Fixed-Length MAC

Domain Extension for MACs

CBC-MAC

The Basic Construction

*Proof of Security

GMAC and Poly

MACs from Difference-Universal Functions

Instantiations

*Information-Theoretic MACs

One-Time MACs from Strongly Universal Functions

One-Time MACs from Difference-Universal Functions

Limitations on Information-Theoretic MACs

References and Additional Reading

Exercises

5. CCA-Security and Authenticated Encryption

Chosen-Ciphertext Attacks and CCA-Security

Padding-Oracle Attacks

Defining CCA-Security

Authenticated Encryption

Defining Authenticated Encryption

CCA Security vs Authenticated Encryption

Authenticated Encryption Schemes

Generic Constructions

Standardized Schemes

Secure Communication Sessions

References and Additional Reading

Exercises

6. Hash Functions and Applications

Definitions

Collision Resistance

Weaker Notions of Security

Domain Extension: The Merkle-Damgard Transform

Message Authentication Using Hash Functions

Hash-and-MAC

HMAC

Generic Attacks on Hash Functions

Birthday Attacks for Finding Collisions

Small-Space Birthday Attacks

*Time/Space Tradeo s for Inverting Hash Functions

The Random-Oracle Model

The Random-Oracle Model in Detail

Is the Random-Oracle Methodology Sound?

Additional Applications of Hash Functions

Fingerprinting and Deduplication

Merkle Trees

Password Hashing

Key Derivation

Commitment Schemes

References and Additional Reading

Exercises

7. Practical Constructions of Symmetric-Key Primitives

Stream Ciphers

Linear-Feedback Shift Registers

Adding Nonlinearity

Trivium

RC4

ChaCha20

Block Ciphers

Substitution-Permutation Networks

Feistel Networks

DES - The Data Encryption Standard

3 DES: Increasing the Key Length of a Block Cipher

AES -The Advanced Encryption Standard

*Differential and Linear Cryptanalysis

Compression Functions and Hash Functions

Compression Functions from Block Ciphers

MD5, SHA-1, and SHA-2

The Sponge Construction and SHA-3 (Keccak)

References and Additional Reading

Exercises

8. *Theoretical Constructions of Symmetric-Key Primitives

One-Way Functions

Definitions

Candidate One-Way Functions

Hard-Core Predicates

From One-Way Functions to Pseudorandomness

Hard-Core Predicates from One-Way Functions

A Simple Case

A More Involved Case

The Full Proof

Constructing Pseudorandom Generators

Pseudorandom Generators with Minimal Expansion

Increasing the Expansion Factor

Constructing Pseudorandom Functions

Constructing (Strong) Pseudorandom Permutations

Assumptions for Private-Key Cryptography

Computational Indistinguishability

References and Additional Reading

Exercises

III Public-Key (Asymmetric) Cryptography

9. Number Theory and Cryptographic Hardness Assumptions

Preliminaries and Basic Group Theory

Primes and Divisibility

Modular Arithmetic

Groups

The Group ZN

*Isomorphisms and the Chinese Remainder Theorem

Primes, Factoring, and RSA

Generating Random Primes

*Primality Testing

The Factoring Assumption

The RSA Assumption

*Relating the Factoring and RSA Assumptions

Cryptographic Assumptions in Cyclic Groups

Cyclic Groups and Generators

The Discrete-Logarithm/Diffie-Hellman Assumptions

Working in (Subgroups of) Zp

Elliptic Curves

*Cryptographic Applications

One-Way Functions and Permutations

Collision-Resistant Hash Functions

References and Additional Reading

Exercises

10. *Algorithms for Factoring and Computing Discrete Logarithms

Algorithms for Factoring

Pollard's p - Algorithm

Pollard's Rho Algorithm

The Quadratic Sieve Algorithm

Generic Algorithms for Computing Discrete Logarithms

The Pohlig-Hellman Algorithm

The Baby-Step/Giant-Step Algorithm

Discrete Logarithms from Collisions

Index Calculus: Computing Discrete Logarithms in Zp

Recommended Key Lengths

References and Additional Reading

Exercises

11. Key Management and the Public-Key Revolution

Key Distribution and Key Management

A Partial Solution: Key-Distribution Centers

Key Exchange and the Diffie-Hellman Protocol

The Public-Key Revolution

References and Additional Reading

Exercises

12. Public-Key Encryption

Public-Key Encryption - An Overview

Definitions

Security against Chosen-Plaintext Attacks

Multiple Encryptions

Security against Chosen-Ciphertext Attacks

Hybrid Encryption and the KEM/DEM Paradigm

CPA-Security

CCA-Security

CDH/DDH-Based Encryption

El Gamal Encryption

DDH-Based Key Encapsulation

*A CDH-Based KEM in the Random-Oracle Model

*Chosen-Ciphertext Security and DHIES/ECIES

RSA-Based Encryption

Plain RSA Encryption

Padded RSA and PKCS # v

*CPA-Secure Encryption without Random Oracles

OAEP and PKCS # v

*A CCA-Secure KEM in the Random-Oracle Model

RSA Implementation Issues and Pitfalls

References and Additional Reading

Exercises

13. Digital Signature Schemes

Digital Signatures - An Overview

Definitions

The Hash-and-Sign Paradigm

RSA-Based Signatures

Plain RSA Signatures

RSA-FDH and PKCS #1 Standards

Signatures from the Discrete-Logarithm Problem

Identification Schemes and Signatures

The Schnorr Identification/Signature Schemes

DSA and ECDSA

Certificates and Public-Key Infrastructures

Putting It All Together { TLS

*Signcryption

References and Additional Reading

Exercises

14. *Post-Quantum Cryptography

Post-Quantum Symmetric-Key Cryptography

Grover's Algorithm and Symmetric-Key Lengths

Collision-Finding Algorithms and Hash Functions

Shor's Algorithm and its Impact on Cryptography

Post-Quantum Public-Key Encryption

Post-Quantum Signatures

Lamport's Signature Scheme

Chain-Based Signatures

Tree-Based Signatures

References and Additional Reading

Exercises

15. *Advanced Topics in Public-Key Encryption

Public-Key Encryption from Trapdoor Permutations

Trapdoor Permutations

Public-Key Encryption from Trapdoor Permutations

The Paillier Encryption Scheme

The Structure of Z_N

The Paillier Encryption Scheme

Homomorphic Encryption

Secret Sharing and Threshold Encryption

Secret Sharing

Verifiable Secret Sharing

Threshold Encryption and Electronic Voting

The Goldwasser-Micali Encryption Scheme

Quadratic Residues Modulo a Prime

Quadratic Residues Modulo a Composite

The Quadratic Residuosity Assumption

The Goldwasser-Micali Encryption Scheme

The Rabin Encryption Scheme

Computing Modular Square Roots

A Trapdoor Permutation Based on Factoring

The Rabin Encryption Scheme

References and Additional Reading

Exercises

Index of Common Notation

Appendix A Mathematical Background

A Identities and Inequalities

A Asymptotic Notation

A Basic Probability

A The \Birthday" Problem

A *Finite Fields

Appendix B Basic Algorithmic Number Theory

B Integer Arithmetic

B Basic Operations

B The Euclidean and Extended Euclidean Algorithms

B Modular Arithmetic

B Basic Operations

B Computing Modular Inverses

B Modular Exponentiation

B *Montgomery Multiplication

B Choosing a Uniform Group Element

B *Finding a Generator of a Cyclic Group

B Group-Theoretic Background

B Efficient Algorithms

References and Additional Reading

Exercises



 

/

Matchmaking in the Archive - 19 Conversations with the Dead and 3 Encounters with Ghosts (Hardcover): E.G. Crichton, Chris... Matchmaking in the Archive - 19 Conversations with the Dead and 3 Encounters with Ghosts (Hardcover)
E.G. Crichton, Chris Vargas, Jonathan Katz, Michelle Tea
R1,792 R1,697 Discovery Miles 16 970 Save R95 (5%) Ships in 10 - 15 working days
The Right Side of History - 100 Years of Lgbtq Activism (Paperback): Adrian Brooks, Jonathan Katz The Right Side of History - 100 Years of Lgbtq Activism (Paperback)
Adrian Brooks, Jonathan Katz
R516 Discovery Miles 5 160 Ships in 10 - 15 working days

Before, During, and After Stonewall: 100 Years of Heroes and History The Right Side of History tells the 100-year history of queer activism in a series of revealing close-ups, first-person accounts, and intimate snapshots of LGBT pioneers and radicals. This diverse cast stretches from the Edwardian period to today, including first-person accounts of the key protest that is at the heart of the 2015 movie Stonewall. The book shows how LGBT folk have always been in the forefront of progressive social evolution in the United States. It references heroes like Abraham Lincoln, Eleanor Roosevelt, Bayard Rustin, Harvey Milk, and Edie Windsor. Equally, the book honors names that aren't in history books, from participants in the Names Project, a national phenomenon memorializing 94,000 AIDS victims, to underground artists and writers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
An Introduction To Scholarship…
Cheryl Siewierski Paperback  (2)
R415 Discovery Miles 4 150
Don't Give Up, Don't Give In - Life…
Louis Zamperini, David Rensin Paperback  (2)
R313 R284 Discovery Miles 2 840
The Story of Hilton Hotels - 'Little…
Barbara Czyzewska Paperback R1,135 Discovery Miles 11 350
Dimensions Of Healthcare Management
Marhie Bezuidenhout Paperback  (1)
R668 R615 Discovery Miles 6 150
All Dhal'd Up - Every Day, Indian-ish…
Kamini Pather Hardcover R420 R319 Discovery Miles 3 190
Vlok's Community Health For Southern…
Marina Clarke Paperback R821 R737 Discovery Miles 7 370
Damaged Goods - The Rise and Fall of Sir…
Oliver Shah Paperback  (1)
R289 R264 Discovery Miles 2 640
Cocoa Butter and Related Compounds
Nissim Garti, Neil R. Widlak Hardcover R4,705 Discovery Miles 47 050
Europe - Faith and Plan
Oswald Mosley Hardcover R807 Discovery Miles 8 070
The Subtle Art Of Not Giving A F*ck - A…
Mark Manson Paperback  (3)
R295 R264 Discovery Miles 2 640

 

Partners