Rövidített megjelenítés

dc.contributorLigeti Péteren_EN
dc.contributorPálvölgyi Dömötören_EN
dc.contributorNagy Dánielen_EN
dc.creatorSziklai Péteren_EN
dc.date2014-04-30en_EN
dc.date.accessioned2019-08-08T10:33:03Z
dc.date.available2019-08-08T10:33:03Z
dc.identifier.urihttp://dtk.tankonyvtar.hu/xmlui/handle/123456789/3845
dc.descriptionThe main purpose of these lecture notes is to present various topics of cryptography and security engineering beyond the scope of the widely-known basic studies. A little familiarity in computer science and cryptography is supposed on the readers’ part but the necessary mathematical or algorithmic background is presented or cited. The different aspects cover the spectrum from theoretical and applied mathematics to economics. We recommend these lecture notes to anyone who is interested in the background behind several security mechanisms or seeks extended knowledge in advanced cryptographic schemes. Computer scientists, engineers, mathematicians or programmers can effectively learn and understand the content of the book. The textbook contains chapters from the following main topics: introduction to security, multiple threats and defenses, classical cryptography, randomness, symmetric and asymmetric cryptography and last but not least cryptographic primitives. This last one constitutes the core of the material covering for example zero-knowledge proofs, secure multiparty computation and lattice based cryptographic methods.en_EN
dc.formatapplication/epub+zipen_EN
dc.formatapplication/pdfen_EN
dc.languageenen_EN
dc.publisherEötvös Loránd University Faculty of Informaticsen_EN
dc.relation1. Security and Privacy programen_EN
dc.relationAdvanced Cryptography (ELTE)en_EN
dc.rightsSziklai Péteren_EN
dc.rightsLigeti Péteren_EN
dc.rightsPálvölgyi Dömötören_EN
dc.rightsNagy Dánielen_EN
dc.rightsEötvös Loránd University Faculty of Informaticsen_EN
dc.subjectMultiple Threats and Defensesen_EN
dc.subjectClassical cryptographyen_EN
dc.subjectRandomnessen_EN
dc.subjectSymmetric and Asymmetric Cryptographyen_EN
dc.subjectCryptographic Primitivesen_EN
dc.subjectIntroduction to Securityen_EN
dc.subjectCryptographyen_EN
dc.subjectKey managementen_EN
dc.subjectPublic key (asymmetric) techniquesen_EN
dc.subjectDigital signaturesen_EN
dc.subjectPublic key encryptionen_EN
dc.subjectSymmetric cryptography and hash functionsen_EN
dc.subjectBlock and stream ciphersen_EN
dc.subjectHash functions and message authentication codesen_EN
dc.subjectCryptanalysis and other attacksen_EN
dc.subjectInformation-theoretic techniquesen_EN
dc.subjectMathematical foundations of cryptographyen_EN
dc.subjectSecurity and privacyen_EN
dc.titleAdvanced Cryptographyen_EN
dc.typeTankönyven_EN
dtk.firNatural Scienceen_EN
dtk.oecd01. Natural sciences::01.01. Mathematics::01.01.01. Pure mathematics, applied mathematicsen_EN
dtk.playerpdfplayeren_EN
dtk.purchaseTÁMOP-4.1.2.A/1-11/1-2011-0050 Eötvös Loránd Tudományegyetemen_EN
dtk.size62 p.en_EN
dtk.typebooken_EN
dtk.udc---- MAIN TABLES::0 SCIENCE AND KNOWLEDGE. ORGANIZATION. COMPUTER SCIENCE. INFORMATION. DOCUMENTATION. LIBRARIANSHIP. INSTITUTIONS. PUBLICATIONS::005 Management::51 Mathematicsen_EN


A dokumentumhoz tartozó fájlok

Thumbnail
Thumbnail
Thumbnail
Thumbnail

A dokumentum a következő gyűjtemény(ek)ben található meg

Rövidített megjelenítés