Encryption Software and Books Encryption Software and Books
   Home >  Encryption Software >  Books > Cryptography


Windows Utilities

Strong File(Folder) Encryption Decryption Utility: easily encrypt and decrypt your files and folders.

Encryption Software - Service Edition with Scheduling: allows you easily and quickly to run scheduled encryption and decryption sessions as a service process.

Auto FTP Premium: save time and money with automated ftp client software. Upload and download encrypted files and folders.




Bestselling and bargain books: Cryptography
* Search bestsellers
* Search bargain books
* Other books




   


Books -> Cryptography


Pseudorandomness and Cryptographic Applications (Princeton Computer Science Notes)

by:
Luby, Michael




Publisher:
Princeton University Press
Published: January 8, 1996
ISBN: 0691025460
Format:Paperback
Pages:248


   Read More, Buy It

Book Description
Amazon.com
Pseudorandomness and Cryptographic Applications, by Michael Luby, presents the mathematical underpinnings of one-way hash functions, which can be used to implement pseudorandom number generators. (These have a wide array of applications in cryptography.) After covering these basic mathematical ideas, the author delves into their applications in cryptosystems. Organized in 18 lectures, this book provides a mathematically intense treatise on the subject without much commentary in between. A set of exercises accompanies each chapter and a bibliography concludes the text. Filled with elegant mathematics, this is clearly a book for academic specialists.

Product Description:
A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack.

There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average.

The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.


  Read More, Buy It




Copyright © 1996-2005 PrimaSoft PC, Inc. All rights reserved.