Contemporary Cryptology: The Science of Information Integrity
Gustavus J. Simmons
IEEE Press, 1992 - Technology & Engineering - 640 pages
The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.
46 pages matching probabilistic in this book
Results 1-3 of 46
What people are saying - Write a review
We haven't found any reviews in the usual places.
The First Ten Years of Public Key Cryptology
11 other sections not shown
Advances in Cryptology algorithm applications attack authentication scheme Berlin bits certificate Chaum ciphertext communication Computer Science cryptanalyst Crypto cryptoalgorithm Data Encryption Data Encryption Standard decryption Diffie digital signature discrete logarithms electronic example exponentiation factoring G. J. Simmons hash functions Hellman hence IEEE Trans implementation input integer integer factorization keystream knapsack Lecture Notes LFSR linear complexity Merkle modulo Notes in Computer Odlyzko one-way function output pair participants pieces of information plaintext polynomial private pieces probabilistic probability problem Proc proof protocol public component public key cryptography public key cryptosystem public key systems quadratic residue quadratic sieve random receiver result Rivest Santa Barbara secrecy secret key Section sequence Shamir shared control scheme shared secret schemes signature scheme signed smart cards Springer-Verlag standard stream cipher techniques Theory tion transformation transmitter trapdoor trapdoor one-way function valid vector verify zero-knowledge