Multivariate public key cryptosystems (MPKC) is a fast-developing area in cryptography. This book systematically presents the subject matter for a broad audience and is the first book to focus on this exciting new topic.
In this book, the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections.
This introduction to cryptography uses a programming-oriented approach to study important current cryptographic schemes and the main cryptanalytic attacks against them. The Maple implementations include many examples with parameters of realistic size.
This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments.
Here is an extensive overview of practical and efficient modern techniques for design and implementation of secure computation and related protocols. Covers circuit optimization, hardware-assisted garbled circuit protocols and modular design of SFE protocols.
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.