Cargando…

Symmetric cryptographic protocols

This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Cov...

Descripción completa

Detalles Bibliográficos
Autor principal: Ramkumar, Mahalingam
Lenguaje:eng
Publicado: Springer 2014
Materias:
Acceso en línea:https://dx.doi.org/10.1007/978-3-319-07584-6
http://cds.cern.ch/record/1952344
_version_ 1780944306664636416
author Ramkumar, Mahalingam
author_facet Ramkumar, Mahalingam
author_sort Ramkumar, Mahalingam
collection CERN
description This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases
id cern-1952344
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2014
publisher Springer
record_format invenio
spelling cern-19523442021-04-21T20:52:34Zdoi:10.1007/978-3-319-07584-6http://cds.cern.ch/record/1952344engRamkumar, MahalingamSymmetric cryptographic protocolsEngineeringThis book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databasesSpringeroai:cds.cern.ch:19523442014
spellingShingle Engineering
Ramkumar, Mahalingam
Symmetric cryptographic protocols
title Symmetric cryptographic protocols
title_full Symmetric cryptographic protocols
title_fullStr Symmetric cryptographic protocols
title_full_unstemmed Symmetric cryptographic protocols
title_short Symmetric cryptographic protocols
title_sort symmetric cryptographic protocols
topic Engineering
url https://dx.doi.org/10.1007/978-3-319-07584-6
http://cds.cern.ch/record/1952344
work_keys_str_mv AT ramkumarmahalingam symmetriccryptographicprotocols