Introduction to modern cryptography:
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- I: Introduction and Classical Cryptography -- 1: Introduction -- 1.1 Cryptography and Modern Cryptography -- 1.2 The Setting of Private-Key Encryption -- 1.3 Historical Ciphers and The...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press, Taylor & Francis Group
[2021]
|
Ausgabe: | Third edition |
Schriftenreihe: | Chapman and Hall/CRC cryptography and network security series
|
Schlagworte: | |
Online-Zugang: | FUBA1 TUM01 UER01 |
Zusammenfassung: | Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- I: Introduction and Classical Cryptography -- 1: Introduction -- 1.1 Cryptography and Modern Cryptography -- 1.2 The Setting of Private-Key Encryption -- 1.3 Historical Ciphers and Their Cryptanalysis -- 1.4 Principles of Modern Cryptography -- 1.4.1 Principle 1 { Formal De nitions -- 1.4.2 Principle 2 { Precise Assumptions -- 1.4.3 Principle 3 { Proofs of Security -- 1.4.4 Provable Security and Real-World Security -- References and Additional Reading -- Exercises -- 2: Perfectly Secret Encryption -- 2.1 Defnitions -- 2.2 The One-Time Pad -- 2.3 Limitations of Perfect Secrecy -- 2.4 *Shannon's Theorem -- References and Additional Reading -- Exercises -- II: Private-Key (Symmetric) Cryptography -- 3: Private-Key Encryption -- 3.1 Computational Security -- 3.1.1 The Concrete Approach -- 3.1.2 The Asymptotic Approach -- 3.2 Defining Computationally Secure Encryption -- 3.2.1 The Basic Definition of Security (EAV-Security) -- 3.2.2 *Semantic Security -- 3.3 Constructing an EAV-Secure Encryption Scheme -- 3.3.1 Pseudorandom Generators -- 3.3.2 Proofs by Reduction -- 3.3.3 EAV-Security from a Pseudorandom Generator -- 3.4 Stronger Security Notions -- 3.4.1 Security for Multiple Encryptions -- 3.4.2 Chosen-Plaintext Attacks and CPA-Security -- 3.4.3 CPA-Security for Multiple Encryptions -- 3.5 Constructing a CPA-Secure Encryption Scheme -- 3.5.1 Pseudorandom Functions and Permutations -- 3.5.2 CPA-Security from a Pseudorandom Function -- 3.6 Modes of Operation and Encryption in Practice -- 3.6.1 Stream Ciphers -- 3.6.2 Stream-Cipher Modes of Operation -- 3.6.3 Block Ciphers and Block-Cipher Modes of Operation -- 3.6.4 *Nonce-Based Encryption -- References and Additional Reading -- Exercises -- 4: Message Authentication Codes |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (xx, 626 Seiten) |
ISBN: | 9781351133036 9781351133012 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV047108529 | ||
003 | DE-604 | ||
005 | 20240104 | ||
007 | cr|uuu---uuuuu | ||
008 | 210127s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781351133036 |c ebook |9 978-1-351-13303-6 | ||
020 | |a 9781351133012 |9 978-1-351-13301-2 | ||
035 | |a (OCoLC)1235885358 | ||
035 | |a (DE-599)KEP060716576 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-188 |a DE-91G |a DE-29 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a DAT 465 |2 stub | ||
100 | 1 | |a Katz, Jonathan |d 1974- |e Verfasser |0 (DE-588)133268101 |4 aut | |
245 | 1 | 0 | |a Introduction to modern cryptography |c Jonathan Katz and Yehuda Lindell |
250 | |a Third edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press, Taylor & Francis Group |c [2021] | |
300 | |a 1 Online-Ressource (xx, 626 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Chapman and Hall/CRC cryptography and network security series | |
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | 3 | |a Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- I: Introduction and Classical Cryptography -- 1: Introduction -- 1.1 Cryptography and Modern Cryptography -- 1.2 The Setting of Private-Key Encryption -- 1.3 Historical Ciphers and Their Cryptanalysis -- 1.4 Principles of Modern Cryptography -- 1.4.1 Principle 1 { Formal De nitions -- 1.4.2 Principle 2 { Precise Assumptions -- 1.4.3 Principle 3 { Proofs of Security -- 1.4.4 Provable Security and Real-World Security -- References and Additional Reading -- Exercises -- 2: Perfectly Secret Encryption -- 2.1 Defnitions -- 2.2 The One-Time Pad -- 2.3 Limitations of Perfect Secrecy -- 2.4 *Shannon's Theorem -- References and Additional Reading -- Exercises -- II: Private-Key (Symmetric) Cryptography -- 3: Private-Key Encryption -- 3.1 Computational Security -- 3.1.1 The Concrete Approach -- 3.1.2 The Asymptotic Approach -- 3.2 Defining Computationally Secure Encryption -- 3.2.1 The Basic Definition of Security (EAV-Security) -- 3.2.2 *Semantic Security -- 3.3 Constructing an EAV-Secure Encryption Scheme -- 3.3.1 Pseudorandom Generators -- 3.3.2 Proofs by Reduction -- 3.3.3 EAV-Security from a Pseudorandom Generator -- 3.4 Stronger Security Notions -- 3.4.1 Security for Multiple Encryptions -- 3.4.2 Chosen-Plaintext Attacks and CPA-Security -- 3.4.3 CPA-Security for Multiple Encryptions -- 3.5 Constructing a CPA-Secure Encryption Scheme -- 3.5.1 Pseudorandom Functions and Permutations -- 3.5.2 CPA-Security from a Pseudorandom Function -- 3.6 Modes of Operation and Encryption in Practice -- 3.6.1 Stream Ciphers -- 3.6.2 Stream-Cipher Modes of Operation -- 3.6.3 Block Ciphers and Block-Cipher Modes of Operation -- 3.6.4 *Nonce-Based Encryption -- References and Additional Reading -- Exercises -- 4: Message Authentication Codes | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Electronic books | |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lindell, Yehuda |d 1971- |e Verfasser |0 (DE-588)1031893946 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-815-35436-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-367-69350-3 |
912 | |a ZDB-30-PQE |a ZDB-4-NLEBK |a ZDB-7-TFC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032515032 | ||
966 | e | |u http://web.a.ebscohost.com/ehost/detail/detail?vid=0&sid=e7f5c735-7c32-4e94-8c2a-42844bf3e58a%40sessionmgr4008&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=2694843&db=nlebk |l FUBA1 |p ZDB-4-NLEBK |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781351133036 |l TUM01 |p ZDB-7-TFC |q TUM_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781351133036 |l UER01 |p ZDB-7-TFC |q UER_Einzelkauf_2024 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182140653404160 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Katz, Jonathan 1974- Lindell, Yehuda 1971- |
author_GND | (DE-588)133268101 (DE-588)1031893946 |
author_facet | Katz, Jonathan 1974- Lindell, Yehuda 1971- |
author_role | aut aut |
author_sort | Katz, Jonathan 1974- |
author_variant | j k jk y l yl |
building | Verbundindex |
bvnumber | BV047108529 |
classification_rvk | ST 276 SK 170 |
classification_tum | DAT 465 |
collection | ZDB-30-PQE ZDB-4-NLEBK ZDB-7-TFC |
ctrlnum | (OCoLC)1235885358 (DE-599)KEP060716576 |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
edition | Third edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04025nmm a22004931c 4500</leader><controlfield tag="001">BV047108529</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240104 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210127s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351133036</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-351-13303-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351133012</subfield><subfield code="9">978-1-351-13301-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1235885358</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP060716576</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Katz, Jonathan</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)133268101</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to modern cryptography</subfield><subfield code="c">Jonathan Katz and Yehuda Lindell</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 626 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Chapman and Hall/CRC cryptography and network security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- I: Introduction and Classical Cryptography -- 1: Introduction -- 1.1 Cryptography and Modern Cryptography -- 1.2 The Setting of Private-Key Encryption -- 1.3 Historical Ciphers and Their Cryptanalysis -- 1.4 Principles of Modern Cryptography -- 1.4.1 Principle 1 { Formal De nitions -- 1.4.2 Principle 2 { Precise Assumptions -- 1.4.3 Principle 3 { Proofs of Security -- 1.4.4 Provable Security and Real-World Security -- References and Additional Reading -- Exercises -- 2: Perfectly Secret Encryption -- 2.1 Defnitions -- 2.2 The One-Time Pad -- 2.3 Limitations of Perfect Secrecy -- 2.4 *Shannon's Theorem -- References and Additional Reading -- Exercises -- II: Private-Key (Symmetric) Cryptography -- 3: Private-Key Encryption -- 3.1 Computational Security -- 3.1.1 The Concrete Approach -- 3.1.2 The Asymptotic Approach -- 3.2 Defining Computationally Secure Encryption -- 3.2.1 The Basic Definition of Security (EAV-Security) -- 3.2.2 *Semantic Security -- 3.3 Constructing an EAV-Secure Encryption Scheme -- 3.3.1 Pseudorandom Generators -- 3.3.2 Proofs by Reduction -- 3.3.3 EAV-Security from a Pseudorandom Generator -- 3.4 Stronger Security Notions -- 3.4.1 Security for Multiple Encryptions -- 3.4.2 Chosen-Plaintext Attacks and CPA-Security -- 3.4.3 CPA-Security for Multiple Encryptions -- 3.5 Constructing a CPA-Secure Encryption Scheme -- 3.5.1 Pseudorandom Functions and Permutations -- 3.5.2 CPA-Security from a Pseudorandom Function -- 3.6 Modes of Operation and Encryption in Practice -- 3.6.1 Stream Ciphers -- 3.6.2 Stream-Cipher Modes of Operation -- 3.6.3 Block Ciphers and Block-Cipher Modes of Operation -- 3.6.4 *Nonce-Based Encryption -- References and Additional Reading -- Exercises -- 4: Message Authentication Codes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lindell, Yehuda</subfield><subfield code="d">1971-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1031893946</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-815-35436-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-367-69350-3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-4-NLEBK</subfield><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032515032</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://web.a.ebscohost.com/ehost/detail/detail?vid=0&sid=e7f5c735-7c32-4e94-8c2a-42844bf3e58a%40sessionmgr4008&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=2694843&db=nlebk</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781351133036</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781351133036</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">UER_Einzelkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV047108529 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:25:39Z |
indexdate | 2024-07-10T09:02:49Z |
institution | BVB |
isbn | 9781351133036 9781351133012 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032515032 |
oclc_num | 1235885358 |
open_access_boolean | |
owner | DE-188 DE-91G DE-BY-TUM DE-29 |
owner_facet | DE-188 DE-91G DE-BY-TUM DE-29 |
physical | 1 Online-Ressource (xx, 626 Seiten) |
psigel | ZDB-30-PQE ZDB-4-NLEBK ZDB-7-TFC ZDB-7-TFC TUM_Einzelkauf ZDB-7-TFC UER_Einzelkauf_2024 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
series2 | Chapman and Hall/CRC cryptography and network security series |
spelling | Katz, Jonathan 1974- Verfasser (DE-588)133268101 aut Introduction to modern cryptography Jonathan Katz and Yehuda Lindell Third edition Boca Raton ; London ; New York CRC Press, Taylor & Francis Group [2021] 1 Online-Ressource (xx, 626 Seiten) txt rdacontent c rdamedia cr rdacarrier Chapman and Hall/CRC cryptography and network security series Description based on publisher supplied metadata and other sources Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- I: Introduction and Classical Cryptography -- 1: Introduction -- 1.1 Cryptography and Modern Cryptography -- 1.2 The Setting of Private-Key Encryption -- 1.3 Historical Ciphers and Their Cryptanalysis -- 1.4 Principles of Modern Cryptography -- 1.4.1 Principle 1 { Formal De nitions -- 1.4.2 Principle 2 { Precise Assumptions -- 1.4.3 Principle 3 { Proofs of Security -- 1.4.4 Provable Security and Real-World Security -- References and Additional Reading -- Exercises -- 2: Perfectly Secret Encryption -- 2.1 Defnitions -- 2.2 The One-Time Pad -- 2.3 Limitations of Perfect Secrecy -- 2.4 *Shannon's Theorem -- References and Additional Reading -- Exercises -- II: Private-Key (Symmetric) Cryptography -- 3: Private-Key Encryption -- 3.1 Computational Security -- 3.1.1 The Concrete Approach -- 3.1.2 The Asymptotic Approach -- 3.2 Defining Computationally Secure Encryption -- 3.2.1 The Basic Definition of Security (EAV-Security) -- 3.2.2 *Semantic Security -- 3.3 Constructing an EAV-Secure Encryption Scheme -- 3.3.1 Pseudorandom Generators -- 3.3.2 Proofs by Reduction -- 3.3.3 EAV-Security from a Pseudorandom Generator -- 3.4 Stronger Security Notions -- 3.4.1 Security for Multiple Encryptions -- 3.4.2 Chosen-Plaintext Attacks and CPA-Security -- 3.4.3 CPA-Security for Multiple Encryptions -- 3.5 Constructing a CPA-Secure Encryption Scheme -- 3.5.1 Pseudorandom Functions and Permutations -- 3.5.2 CPA-Security from a Pseudorandom Function -- 3.6 Modes of Operation and Encryption in Practice -- 3.6.1 Stream Ciphers -- 3.6.2 Stream-Cipher Modes of Operation -- 3.6.3 Block Ciphers and Block-Cipher Modes of Operation -- 3.6.4 *Nonce-Based Encryption -- References and Additional Reading -- Exercises -- 4: Message Authentication Codes Kryptologie (DE-588)4033329-2 gnd rswk-swf Electronic books (DE-588)4151278-9 Einführung gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Lindell, Yehuda 1971- Verfasser (DE-588)1031893946 aut Erscheint auch als Druck-Ausgabe, Hardcover 978-0-815-35436-9 Erscheint auch als Druck-Ausgabe 978-0-367-69350-3 |
spellingShingle | Katz, Jonathan 1974- Lindell, Yehuda 1971- Introduction to modern cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4151278-9 |
title | Introduction to modern cryptography |
title_auth | Introduction to modern cryptography |
title_exact_search | Introduction to modern cryptography |
title_exact_search_txtP | Introduction to modern cryptography |
title_full | Introduction to modern cryptography Jonathan Katz and Yehuda Lindell |
title_fullStr | Introduction to modern cryptography Jonathan Katz and Yehuda Lindell |
title_full_unstemmed | Introduction to modern cryptography Jonathan Katz and Yehuda Lindell |
title_short | Introduction to modern cryptography |
title_sort | introduction to modern cryptography |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie Einführung |
work_keys_str_mv | AT katzjonathan introductiontomoderncryptography AT lindellyehuda introductiontomoderncryptography |