| title : |
Information-theoretic Cryptography |
| Type de document : |
printed text |
| Auteur : |
Himanshu Tyagi, Author |
| Editeur : |
new york : Cambridge University Press |
| Date de publication : |
2023 |
| Nombre de pages : |
504p. |
| Dimensions : |
25*18 |
| ISBN (ou autre code) : |
978-1-108-48433-6 |
| Langue : |
English (eng) Langue originale : English (eng) |
| Indexation : |
Prg |
| Résumé : |
This book offers a mathematical foundation for modern cryptography. It is primarily intended as an i ntroduction for graduate students. Readers should have basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives. To evaluate the efficiency of such constructions, information-theoretic tools, such as smooth min/max entropies and information spectrum, are developed. The broad coverage means the book will also be useful to experts as well as students in cryptography as a reference for information-theoretic concepts and tools. |
| Lien vers la ressource électronique : |
http://opac.centre-univ-mila.dz/z//005-06-1.pdf |
Information-theoretic Cryptography [printed text] / Himanshu Tyagi, Author . - new york : Cambridge University Press, 2023 . - 504p. ; 25*18. ISBN : 978-1-108-48433-6 Langue : English ( eng) Langue originale : English ( eng)
| Indexation : |
Prg |
| Résumé : |
This book offers a mathematical foundation for modern cryptography. It is primarily intended as an i ntroduction for graduate students. Readers should have basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives. To evaluate the efficiency of such constructions, information-theoretic tools, such as smooth min/max entropies and information spectrum, are developed. The broad coverage means the book will also be useful to experts as well as students in cryptography as a reference for information-theoretic concepts and tools. |
| Lien vers la ressource électronique : |
http://opac.centre-univ-mila.dz/z//005-06-1.pdf |
|  |