Gratis Versand in ganz Österreich
Bookbot

Dingyi Pei

    Information security and cryptology
    Authentication Codes and Combinatorial Designs
    • Focusing on the intersection of authentication codes and combinatorial designs, this book provides an in-depth exploration of optimal authentication codes and secure schemes, both symmetric and asymmetric. It highlights the significance of combinatorial concepts in cryptography, presenting clear proofs of information-theoretic and combinatorial bounds. The author employs accessible mathematical language to elucidate complex ideas, making it a valuable resource for understanding the principles and applications of authentication in cryptography.

      Authentication Codes and Combinatorial Designs
    • Information security and cryptology

      • 534 Seiten
      • 19 Lesestunden

      KlappentextThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007. The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.

      Information security and cryptology