Symmetric Cryptographic Protocols
This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...
Guardado en:
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Lenguaje: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Materias: | |
Acceso en línea: | http://dx.doi.org/10.1007/978-3-319-07584-6 |
Aporte de: | Registro referencial: Solicitar el recurso aquí |
Tabla de Contenidos:
- Introduction
- Some Useful Constructions
- Non-scalable Key Distribution Schemes
- MLS for Internet Security Protocols
- Scalable Key Distribution Schemes
- Scalable Extensions of Non-scalable Schemes
- Using PKPSs With Tamper-Responsive Modules
- Broadcast Authentication and Broadcast Encryption
- Authenticated Data Structures
- Universal Trusted Computing Bases
- Conclusions and References.