Multivariate public key cryptosystems (MPKC) is a fast-developing area in cryptography. This book systematically presents the subject matter for a broad audience and is the first book to focus on this exciting new topic.
This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms, protocols, and methods of design and analysis, rendering algorithms in readable pseudocode and simple graphics and diagrams.
In this book, the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections.
This book explains the most important concepts, standards, implementations, and applications of public key infrastructures (PKIs). All chapters contain exercises, with solutions provided in an appendix.
This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments.
Here is an extensive overview of practical and efficient modern techniques for design and implementation of secure computation and related protocols. Covers circuit optimization, hardware-assisted garbled circuit protocols and modular design of SFE protocols.
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.