Description:
Author: Mihir Bellare, Phillip Rogaway
This course is an introduction to modern cryptography as a science. The viewpoint in this course is "theory brought to practice", specifically the application of the theory of "provable-security" to the design and analysis of real world cryptographic schemes. This course considers tasks like encryption, signatures, authentication, and key distribution. The goal is to instill understanding of fundamentals of cryptographic protocol design.
Content:
Introduction
Block ciphers
Pseudorandom functions
Symmetric encryption
Hash functions
Message authentication
Computational number theory
Number-theoretic primitives
Asymmetric encryption
Digital signatures
Key distribution
Link 1
Or
Link 2
Thursday, October 29, 2009
Introduction to Modern Cryptography
Labels:
Ebooks,
Networking
related posts:
- Trade Mark Law And Sharing Names: Exploring Use of the Same Mark by Multiple Undertakings
- Judicial Review in EU Law
- Business Legislation
- Law without Nations?: Why Constitutional Government Requires Sovereign States
- Dale and Appelbe's Pharmacy Law and Ethics, 9th Edition
- After Abu Ghraib: Exploring Human Rights in America and the Middle East
- Essential Law for Your Business: A Practical Guide to All Legal and Financial Requirements
- Becoming a U.S. Citizen: A Guide to the Law, Exam & Interview
- Perfect Phrases for Professional Networking: Hundreds of Ready-to-Use Phrases for Meeting
- Solaris 9 Network Administrator Exam Cram 2 (Exam CX-310-044)
- Principles of Data Mining (Adaptive Computation and Machine Learning)
- Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference
- MCSE Training Kit Networking Essentials Plus, Third Edition
- Upgrading and Repairing Networks
- CCSP: Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541)
- CCNP: Complete Study Guide (642-801, 642-811, 642-821, 642-831)
- Bluetooth Demystified
- Introduction to Modern Cryptography
- Live IT Magazine November2009
- Chandamama(English) July2005
0 comments: