Cryptography Reference
In-Depth Information
In Chapter 10, Symmetric Encryption Systems , we begin the part on secret key
cryptosystems (i.e., Part III) by overviewing and discussing some symmetric
encryption systems.
In Chapter 11, Message Authentication Codes , we address message authenti-
cation and explain how secret key cryptography can be used to generate and
verify message authentication codes (MACs).
In Chapter 12, Pseudorandom Bit Generators , we explore the notion and elab-
orate on possible constructions for pseudorandom bit generators (PRBGs).
In Chapter 13, Pseudorandom Functions , we introduce, discuss, and put into
perspective pseudorandom functions (PRFs).
In Chapter 14, Asymmetric Encryption Systems , we begin the part on public
key cryptosystems (i.e., Part IV) by overviewing and discussing some asym-
metric encryption systems.
In Chapter 15, Digital Signature Systems , we elaborate on digital signatures
and digital signature systems (DSSs) as an increasingly important application
of public key cryptography.
In Chapter 16, Key Establishment , we address key establishment and elaborate
on corresponding key distribution and key agreement protocols.
In Chapter 17, Entity Authentication , we elaborate on entity authentication in
general and (cryptographic) authentication protocols that implement a proof
by knowledge in particular.
In Chapter 18, Secure Multiparty Computation , we address the problem of
how mutually distrusting parties can compute a function without revealing
their individual arguments to one another.
In Chapter 19, Key Management , we begin the epilogue (i.e., Part V) by
discussing some aspects related to key management.
In Chapter 20, Conclusions , we conclude with some remarks about the current
state of the art in cryptography.
In Chapter 21, Outlook , we provide an outlook about possible and likely
developments and trends in the future.
Last but not least, the topic includes two appendixes (i.e., a list of abbreviations
and acronyms and a summary of the mathematical notation used in the topic), a page
about the author, and an index.
Search WWH ::




Custom Search