Publication year: 2008
ISBN: 978-3-540-89754-5
Internet Resource: Please Login to download book
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.
Subject: Computer Science, AES, access control, anonymity, authentication, bilinear maps, biometrics, block cipher, cryptanalysis, cryptographic attacks, cryptography, cryptology, cryptosystems, data security, didgital signature schemes, elliptic curve cryptography, encryption sche, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science, Systems and Data Security, Management of Computing and Information Systems, Computer Communication Networks