Symmetric Cryptographic Protocols

This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: Ramkumar, Mahalingam
Formato: Libro electrónico
Lenguaje:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2014.
Materias:
Acceso en línea:http://dx.doi.org/10.1007/978-3-319-07584-6
Aporte de:Registro referencial: Solicitar el recurso aquí
Tabla de Contenidos:
  • Introduction
  • Some Useful Constructions
  • Non-scalable Key Distribution Schemes
  • MLS for Internet Security Protocols
  • Scalable Key Distribution Schemes
  • Scalable Extensions of Non-scalable Schemes
  • Using PKPSs With Tamper-Responsive Modules
  • Broadcast Authentication and Broadcast Encryption
  • Authenticated Data Structures
  • Universal Trusted Computing Bases
  • Conclusions and References.