Catholic University of Zimbabwe Library
Online Public Access Catalogue
(OPAC)

The Joy of Cryptography Mike Rosulek

Contributor(s): Rosulek, Mike [author] | Open Textbook Library [distributor]Material type: TextTextSeries: Open textbook libraryDistributor: Open Textbook Library Publisher: Oregon State University Description: 1 online resourceISBN: Subject(s): Mathematics -- Textbooks | Cryptography -- TextbooksLOC classification: QA37.3Online resources: Access online version
Contents:
0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption
Subject: The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4).
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number URL Status Date due Barcode Item holds
eBook eBook
Online Access
QA37.3 (Browse shelf(Opens below)) Link to resource Available
Total holds: 0

0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption

The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4).

Attribution-NonCommercial-ShareAlike

In English.

Description based on online resource

There are no comments on this title.

to post a comment.

OPENING HOURS

Weekdays: 0815hrs - 1800hrs
Weekends:0900hrs - 1200hrs

Closed for Mass:

Mon, Thur: 1200hrs - 1300hrs
Sunday & Public Holiday’s

CALL SUPPORT

0242-570570, 0242-570169
09200664, +263 8644140602

LOCATION

18443, Cranborne Avenue, Hatfield, Harare

Other Links


©2021 | CUZ Library