Wenbo Mao013288741X, 9780132887410, 0130669431, 9780130669438
Coverage includes:
• Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more
• Authentication: basic techniques and principles vs. misconceptions and consequential attacks
• Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos
• Designing stronger counterparts to vulnerable “textbook” crypto schemes
Mao introduces formal and reductionist methodologies to prove the “fit-for-application” security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions.
Reviews
There are no reviews yet.