This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.
This book explains the most important concepts, standards, implementations, and applications of public key infrastructures (PKIs). All chapters contain exercises, with solutions provided in an appendix.
In this book, the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections.
This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms, protocols, and methods of design and analysis, rendering algorithms in readable pseudocode and simple graphics and diagrams.
Multivariate public key cryptosystems (MPKC) is a fast-developing area in cryptography. This book systematically presents the subject matter for a broad audience and is the first book to focus on this exciting new topic.
This account of an effective methodology for defining and verifying security protocols in network communication includes an accompanying tool set that will be of great interest to researchers and advanced professionals working on critical security protocols.