000 03994nam a22005895i 4500
001 978-3-319-57048-8
003 DE-He213
005 20210118123631.0
007 cr nn 008mamaa
008 170405s2017 gw | s |||| 0|eng d
020 _a9783319570488
_9978-3-319-57048-8
024 7 _a10.1007/978-3-319-57048-8
_2doi
050 4 _aQA76.9.D35
050 4 _aQ350-390
072 7 _aUMB
_2bicssc
072 7 _aCOM031000
_2bisacsh
072 7 _aUMB
_2thema
072 7 _aGPF
_2thema
082 0 4 _a005.73
_223
245 1 0 _aTutorials on the Foundations of Cryptography
_h[electronic resource] :
_bDedicated to Oded Goldreich /
_cedited by Yehuda Lindell.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXV, 450 p. 26 illus., 5 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Security and Cryptography,
_x1619-7100
505 0 _aGarbled Circuits as Randomized Encodings of Functions: A Primer -- The Complexity of Public-Key Cryptography -- Pseudorandom Functions: Three Decades Later -- The Many Entropies in One-Way Functions -- Homomorphic Encryption -- How to Simulate It: A Tutorial on the Simulation Proof Technique -- The Complexity of Differential Privacy.
520 _aThis is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study. This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography.
650 0 _aData structures (Computer science).
650 0 _aComputers.
650 1 4 _aData Structures and Information Theory.
_0http://scigraph.springernature.com/things/product-market-codes/I15009
650 2 4 _aTheory of Computation.
_0http://scigraph.springernature.com/things/product-market-codes/I16005
700 1 _aLindell, Yehuda.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319570471
776 0 8 _iPrinted edition:
_z9783319570495
776 0 8 _iPrinted edition:
_z9783319860640
830 0 _aInformation Security and Cryptography,
_x1619-7100
856 4 0 _uhttps://doi.org/10.1007/978-3-319-57048-8
912 _aZDB-2-SCS
999 _c446188
_d446188
942 _cEB
506 _aAvailable to subscribing member institutions only. Доступно лише організаціям членам підписки.
506 _fOnline access from local network of NaUOA.
506 _fOnline access with authorization at https://link.springer.com/
506 _fОнлайн-доступ з локальної мережі НаУОА.
506 _fОнлайн доступ з авторизацією на https://link.springer.com/