Amazon cover image
Image from Amazon.com
Image from Google Jackets

Contemporary cryptology : the science of information integrity

By: Material type: TextTextLanguage: English Publication details: USA IEEE Press 1999Description: xv, 660p. illISBN:
  • 0780353528 (PB)
Subject(s):
Contents:
CRYPTOGRAPHY; The Data Encryption Standard: Past and Future - M. Smid & D. Branstad; Stream Ciphers - R. Rueppel; The First Ten Years of Public Key Cryptology - W. Diffie; Public Key Cryptography - J. Nechvatal; A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms - P. van Oorschot; AUTHENTICATION; Digital Signatures - C. Mitchell, et al; A Survey of Information Authentication - G. Simmons; PROTOCOLS; Overview of Interactive Proof Systems and Zero-Knowledge - J. Feigenbaum; An Introduction to Shared Secret and/or Shared Control Schemes and Their Applications - G. Simmons; CRYPTANALYSIS; Cryptanalysis: A Survey of Recent Results - E. Brickell & A. Odlyzko; Protocol Failures in Cryptosystems - J. Moore; APPLICATIONS; The Smart Card: A Standardized Security Device Dedicated to Public Cryptology - L. Guillou, et al; How to Insure That Data Acquired to Verify Treaty Compliance are Trustworthy
Summary: The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject.
Item type: BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified Status Date due Barcode
IMSc Library 681.18 SIM (Browse shelf(Opens below)) Available 46525

Includes index

Includes bibliographical references

CRYPTOGRAPHY; The Data Encryption Standard: Past and Future - M. Smid & D. Branstad; Stream Ciphers - R. Rueppel; The First Ten Years of Public Key Cryptology - W. Diffie; Public Key Cryptography - J. Nechvatal; A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms - P. van Oorschot; AUTHENTICATION; Digital Signatures - C. Mitchell, et al; A Survey of Information Authentication - G. Simmons; PROTOCOLS; Overview of Interactive Proof Systems and Zero-Knowledge - J. Feigenbaum; An Introduction to Shared Secret and/or Shared Control Schemes and Their Applications - G. Simmons; CRYPTANALYSIS; Cryptanalysis: A Survey of Recent Results - E. Brickell & A. Odlyzko; Protocol Failures in Cryptosystems - J. Moore; APPLICATIONS; The Smart Card: A Standardized Security Device Dedicated to Public Cryptology - L. Guillou, et al; How to Insure That Data Acquired to Verify Treaty Compliance are Trustworthy

The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India