Information-theoretic Cryptography - Himanshu Tyagi
- Format: Relié Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre114,44 €
Produit Neuf
Ou 28,61 € /mois
- Livraison à 0,01 €
- Livré entre le 29 avril et le 6 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781108484336_dbm
Nos autres offres
-
208,99 €
Produit Neuf
Ou 52,25 € /mois
- Livraison : 25,00 €
- Livré entre le 13 et le 18 mai
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Information - Theoretic Cryptography de Himanshu Tyagi Format Relié - Livre
0 avis sur Information - Theoretic Cryptography de Himanshu Tyagi Format Relié - Livre
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Information - Theoretic Cryptography de Himanshu Tyagi Format Relié
- Livre
Résumé :
This book offers a mathematical foundation for modern cryptography. It is primarily intended as an introduction for graduate students. Readers should have a basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as the secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives--
Biographie:
Himanshu Tyagi is an associate professor with the Department of Electrical Communication Engineering at the Indian Institute of Science, Bangalore. A specialist in information theory, his current research focuses on blockchains for crowdsourced networks, distributed statistics under information constraints, and privacy for federated learning data pipelines. He has served as an associate editor for the 'IEEE Transactions on Information Theory' and has been awarded the Indian National Science Academy (INSA) Young Scientist medal for 2020.
Sommaire:
1. Introduction; Part I. External Adversary: Encryption, Authentication, Secret Key: 2. Basic information theory; 3. Secret keys and encryption; 4. Universal hash families; 5. Hypothesis testing; 6. Information reconciliation; 7. Random number generation; 8. Authentication; 9. Computationally secure encryption and authentication; 10. Secret key agreement; Part II. Internal Adversary: Secure Computation: 11. Secret sharing; 12. Two-party secure computation for passive adversary; 13. Oblivious transfer from correlated randomness; 14. Bit commitment from correlated randomness; 15. Active adversary and composable security; 16. Zero-knowledge proof; 17. Two-party secure computation for active adversary; 18. Broadcast, Byzantine agreement, and digital signature; 19. Multiparty secure computation; Appendix. Solutions to selected problems; References; Notation index; Subject index.
Détails de conformité du produit
Personne responsable dans l'UE