Yehuda Lindell - Böcker
Visar alla böcker från författaren Yehuda Lindell. Handla med fri frakt och snabb leverans.
9 produkter
9 produkter
1 327 kr
Tillfälligt slut
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.
1 667 kr
Skickas inom 10-15 vardagar
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject. The authors have kept the book up-to-date while incorporating feedback from instructors and students alike; the presentation is refined, current, and accurate.The book’s focus is on modern cryptography, which is distinguished from classical cryptography by its emphasis on definitions, precise assumptions, and rigorous proofs of security. A unique feature of the text is that it presents theoretical foundations with an eye toward understanding cryptography as used in the real world. This revised edition fixed typos and includes all the updates made to the third edition, including: Enhanced treatment of several modern aspects of private-key cryptography, including authenticated encryption and nonce-based encryption.Coverage of widely used standards such as GMAC, Poly1305, GCM, CCM, and ChaCha20-Poly1305.New sections on the ChaCha20 stream cipher, sponge-based hash functions, and SHA-3.Increased coverage of elliptic-curve cryptography, including a discussion of various curves used in practice.A new chapter describing the impact of quantum computers on cryptography and providing examples of quantum-secure encryption and signature schemes. Containing worked examples and updated exercises, Introduction to Modern Cryptography, Revised Third Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a reference for graduate students, researchers, and practitioners, or a general introduction suitable for self-study.
473 kr
Kommande
This cybersecurity book for beginners and experts alike offers an engaging exploration of cryptography's role in our everyday lives. Matthew Green, professor at Johns Hopkins and creator of the Zcash cryptocurrency, and Yehuda Lindell, Head of Cryptography at Coinbase, demystify the technologies that keep our information safe behind the scenes during common digital interactions, including: Tapping to pay for your morning coffee, Texting friends or emailing coworkers, Shopping on your favorite website, Sharing your location with GPS apps. By distilling complex topics like encryption and digital signatures into clear, approachable explanations, Cryptography for Everyone equips readers to navigate the digital world more safely. Along the way, the authors discuss the potential downsides of cryptography, noting its use in hiding criminal activities and the ongoing debate around government surveillance. To do its job, cryptography should be tough to crack, but that doesn't mean it has to be mysterious. Learn how you're kept safe online and make more informed decisions about your privacy and security with Cryptography for Everyone.
987 kr
Skickas inom 10-15 vardagar
Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity.
715 kr
Skickas inom 10-15 vardagar
Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity.
551 kr
Skickas inom 10-15 vardagar
In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time.This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.
1 840 kr
Skickas inom 10-15 vardagar
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs.
1 840 kr
Skickas inom 10-15 vardagar
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This encompasses any distributed computing task and includes computations as simple as coin-tossing and broadcast, and as c- plex as electronic voting, electronic auctions, electronic cash schemes and anonymous transactions. The feasibility (and infeasibility) of multiparty c- putation has been extensively studied, resulting in a rather comprehensive understanding of what can and cannot be securely computed, and under what assumptions. The theory of cryptography in general, and secure multiparty computation in particular, is rich and elegant. Indeed, the mere fact that it is possible to actually achieve the aforementioned task is both surprising and intriguing.
Theory of Cryptography
11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings
Häftad, Engelska, 2014
551 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.