EPUB (8.99 MB)
Download
Adobe PDF (4.6 MB)
Table of Contents - Adobe PDF (226.35 kB)
Brochure
Download
User comments
Title Details:
Computational Cryptography
Authors: Pagourtzis, Aristeidis
Zachos, Efstathios
Grontas, Panagiotis
Reviewer: Poulakis, Dimitrios
Subject: MATHEMATICS AND COMPUTER SCIENCE > > >
MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY
MATHEMATICS AND COMPUTER SCIENCE >
MATHEMATICS AND COMPUTER SCIENCE > >
MATHEMATICS AND COMPUTER SCIENCE > >
NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > >
ENGINEERING AND TECHNOLOGY > > >
Keywords:
Computational Complexity
Computational Number Theory
Symmetric Cryptography
Public Key Cryptography
Cryptographic Protocols
Information Security
Network Security
Zero-Knowledge Proofs
Blockchain
Secret Sharing
Electronic Voting
Description:
Abstract:
This book aims to introduce the reader to the fundamental concepts and techniques of modern cryptography, with an emphasis on their algorithmic and computational aspects. Concretely, the book contains the following topics: - Introduction to basic algorithmic and computational complexity concepts such as: algorithm analysis, efficiency, polynomial time, probabilistic algorithms, complexity classes. - Elements of number theory and group theory: modular arithmetic, groups, rings, fields, Chinese Remainder Theorem, Fermat's, Euler's, and Lagrange's Theorems, primitive roots, Euler's totient function, quadratic residues, Legendre and Jacobi symbols. - Computational complexity and algorithms for fundamental number-theoretic problems: repeated squaring, Euclidean and extended Euclidean algorithms, Jacobi symbol computation, roots modulo n, primality tests (Fermat, Solovay-Strassen, Miller-Rabin, AKS algorithm), factorization methods (ρ method, Dixon's method), discrete logarithm (Shanks, Pohling-Hellman, index-calculus). - Symmetric cryptosystems: block ciphers (DES, AES), stream ciphers, modes of operation. - Public-key cryptosystems: RSA, ElGamal, Diffie-Hellman key exchange. - Digital signature schemes: RSA, DSS, special-purpose signatures (one-time, blind, undeniable). - Cryptographic protocols: secret sharing, coin flipping, key exchange. - Security proofs based on computational hardness assumptions, security models (KPA, CPA, CCA, IND-CPA, IND-CCA), cryptographic reductions. - Hash functions and one-way functions: pseudo-randomness. - Zero-knowledge proofs: identification protocols. - Advanced topics: quantum and post-quantum cryptography, elliptic curves, protocol composition, bilinear maps, lattice-based cryptography.
Type: Undergraduate textbook
Creation Date: 2015
Item Details:
ISBN 978-960-603-276-9
License: Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0)
DOI http://dx.doi.org/10.57713/kallipos-492
Handle http://hdl.handle.net/11419/5439
Bibliographic Reference: Pagourtzis, A., Zachos, E., & Grontas, P. (2015). Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://dx.doi.org/10.57713/kallipos-492
Language: Greek
Consists of:
1. Introduction
2. Mathematical Background
3. Computation Complexity Background
4. Algorithms in Cryptography
5. Symmetric Cryptosystems
6. Public – Key Cryptosystems
7. Digital Signatures
8. Hash Functions
9. Cryptographic Protocols
10. Zero-Knowledge Proofs
11. Modern Applications
12. Advanced Topics
Number of pages 392
Publication Origin: Kallipos, Open Academic Editions
User comments
There are no published comments available!