Listing 1 - 10 of 72 | << page >> |
Sort by
|
Choose an application
La cryptographie asymétrique introduite par Diffie et Hellman en 1976 a été rapidement mise en oeuvre avec des constructions de chiffrement et de signature. Cela a conduit à un tout nouveau domaine de recherche, avec des définitions formelles et des modèles de sécurité. Depuis lors, des outils impressionnants ont été développés, avec des propriétés innovatrices, notamment en exploitant les couplages sur les courbes elliptiques.Cryptographie asymétrique présente le chiffrement à clé publique et la signature, puis les primitives de base de la cryptographie asymétrique. Il analyse ensuite la notion de sécurité prouvable, qui définit le fait d'être « sécurisé » pour un schéma cryptographique. En outre, une sélection de protocoles est proposée, avec notamment les preuves à divulgation nulle de connaissance, le calcul multi-parties et l'échange de clé. Après un rappel sur la cryptographie basée sur les couplages, cet ouvrage expose des schémas cryptographiques avancés pour la confidentialité et l'authentification, avec des propriétés supplémentaires, tels que des signatures anonymes et du chiffrement multi-receveurs. Enfin, il traite le sujet plus récent du calcul vérifiable.
Choose an application
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur
Public key cryptography. --- Cryptography --- Mathematics. --- Public key cryptography --- Cryptography -- Mathematics
Choose an application
This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval. Keywords: authentication, key agreement, password, public-key cryptography.
Choose an application
In recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. This Internal Report shares the National Institute of Standards and Technology (NIST) s current understanding about the status of quantum computing and post-quantum cryptography, and outlines NIST s initial plan to move forward in this space. The report also recognizes the challenge of moving to new cryptographic infrastructures and therefore emphasizes the need for agencies to focus on crypto agility.
Choose an application
Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.
Choose an application
Choose an application
Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.
Choose an application
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.
Choose an application
Offers an overview of the state-of-the-art in identity-based cryptography.
Choose an application
Listing 1 - 10 of 72 | << page >> |
Sort by
|