Buch, Englisch, 450 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 7022 g
Dedicated to Oded Goldreich
Buch, Englisch, 450 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 7022 g
Reihe: Information Security and Cryptography
ISBN: 978-3-319-86064-0
Verlag: Springer International Publishing
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study.
This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography.
Zielgruppe
Graduate
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Informatik Berechenbarkeitstheorie, Komplexitätstheorie
Weitere Infos & Material
Garbled Circuits as Randomized Encodings of Functions: A Primer.- The Complexity of Public-Key Cryptography.- Pseudorandom Functions: Three Decades Later.- The Many Entropies in One-Way Functions.- Homomorphic Encryption.- How to Simulate It: A Tutorial on the Simulation Proof Technique.- The Complexity of Differential Privacy.