| 000 | 02072nam a2200361 4500 | ||
|---|---|---|---|
| 001 | OTLid0000897 | ||
| 003 | MnU | ||
| 005 | 20201105133415.0 | ||
| 006 | m o d s | ||
| 008 | 200722s2017 mnu o 0 0 eng d | ||
| 020 | _a | ||
| 040 |
_aMnU _beng _cMnU |
||
| 050 | 4 | _aQA37.3 | |
| 245 | 0 | 4 |
_aThe Joy of Cryptography _cMike Rosulek |
| 264 | 2 | _bOpen Textbook Library | |
| 264 | 1 | _bOregon State University | |
| 300 | _a1 online resource | ||
| 490 | 0 | _aOpen textbook library. | |
| 505 | 0 | _a0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption | |
| 520 | 0 | _aThe pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4). | |
| 542 | 1 | _fAttribution-NonCommercial-ShareAlike | |
| 546 | _aIn English. | ||
| 588 | 0 | _aDescription based on online resource | |
| 650 | 0 |
_aMathematics _vTextbooks |
|
| 650 | 0 |
_aCryptography _vTextbooks |
|
| 700 | 1 |
_aRosulek, Mike _eauthor |
|
| 710 | 2 |
_aOpen Textbook Library _edistributor |
|
| 856 | 4 | 0 |
_uhttps://open.umn.edu/opentextbooks/textbooks/897 _zAccess online version |
| 999 |
_c20233 _d20233 |
||