logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Asymmetric Cryptography: Primitives and Protocols by David Pointcheval ISBN 9781789450965, 1789450969

  • SKU: EBN-50597188
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.5

11 reviews
Instant download (eBook) Asymmetric Cryptography: Primitives and Protocols after payment.
Authors:David Pointcheval
Pages:304 pages.
Year:2023
Editon:1
Publisher:Wiley-ISTE
Language:english
File Size:6.71 MB
Format:epub
ISBNS:9781789450965, 1789450969
Categories: Ebooks

Product desciption

(Ebook) Asymmetric Cryptography: Primitives and Protocols by David Pointcheval ISBN 9781789450965, 1789450969

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves.Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange.After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products