Verifiable Composition of Signature and Encryption : A Comprehensive Study of the Design Paradigms /

Detalles Bibliográficos
Autor principal: El Aimani, Laila. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Materias:
LEADER 01550nam a22002895i 4500
001 000294966
005 20211018130354.0
007 cr nn 008mamaa
008 171028s2017 gw | s |||| 0|eng d
020 |a 9783319681122 
024 7 |a 10.1007/978-3-319-68112-2  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
100 1 |a El Aimani, Laila.  |e author. 
245 1 0 |a Verifiable Composition of Signature and Encryption :  |b A Comprehensive Study of the Design Paradigms /  |c by Laila El Aimani. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XX, 148 p. 34 illus., 5 illus. in color. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Part I: Background -- 1. Preliminaries -- 2. Case-study primitives -- Part II: the "Sign then Encrypt" (StE) paradigm -- 3. Analysis of StE -- 4.  An efficient variant of StE -- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm -- 5. Analysis of CtEaS -- 6. CtEtS: an efficient variant of CtEaS -- Part IV: New paradigms -- 7. EtStE: a new paradigm for verifiable signcryption -- 8. Multi-user security -- 9. Insider privacy.-10. Wrap - up. 
650 0 |a Data structures (Computer science). 
650 0 |a Computer science—Mathematics. 
650 1 4 |a Data Structures and Information Theory. 
650 2 4 |a Mathematics of Computing. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks