<電子ブック>
Modern Cryptography, Probabilistic Proofs and Pseudorandomness / by Oded Goldreich
(Algorithms and Combinatorics. ISSN:21976783 ; 17)
版 | 1st ed. 1999. |
---|---|
出版者 | (Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer) |
出版年 | 1999 |
本文言語 | 英語 |
大きさ | XV, 183 p. 1 illus : online resource |
著者標目 | *Goldreich, Oded author SpringerLink (Online service) |
件 名 | LCSH:Discrete mathematics LCSH:Cryptography LCSH:Data encryption (Computer science) LCSH:Probabilities LCSH:Computer science -- Mathematics 全ての件名で検索 LCSH:Computer science FREE:Discrete Mathematics FREE:Cryptology FREE:Probability Theory FREE:Mathematics of Computing FREE:Theory of Computation |
一般注記 | 1. The Foundations of Modern Cryptography -- 2. Probabilistic Proof Systems -- 3. Pseudorandom Generators -- A. Background on Randomness and Computation -- A.1 Probability Theory — Three Inequalities -- A.2 Computational Models and Complexity Classes -- A.2.1 P, NP, and More -- A.2.2 Probabilistic Polynomial-Time -- A.2.3 Non-Uniform Polynomial-Time -- A.2.4 Oracle Machines -- A.2.5 Space Bounded Machines -- A.2.6 Average-Case Complexity -- A.3 Complexity Classes — Glossary -- A.4 Some Basic Cryptographic Settings -- A.4.1 Encryption Schemes -- A.4.2 Digital Signatures and Message Authentication -- A.4.3 The RSA and Rabin Functions -- B. Randomized Computations -- B.1 Randomized Algorithms -- B.1.1 Approx. Counting of DNF Satisfying Assignments -- B.1.2 Finding a Perfect Matching -- B.1.3 Testing Whether Polynomials Are Identical -- B.1.4 Randomized Rounding Applied to MaxSAT -- B.1.5 Primality Testing -- B.1.6 Testing Graph Connectivity via a Random Walk -- B.1.7 Finding Minimum Cuts in Graphs -- B.2 Randomness in Complexity Theory -- B.2.1 Reducing (Approximate) Counting to Deciding -- B.2.2 Two-sided Error Versus One-sided Error -- B.2.3 The Permanent: Worst-Case vs Average Case -- B.3 Randomness in Distributed Computing -- B.3.1 Testing String Equality -- B.3.2 Routing in Networks -- B.3.3 Byzantine Agreement -- B.4 Bibliographic Notes -- C. Two Proofs -- C.1 Parallel Repetition of Interactive Proofs -- C.2 A Generic Hard-Core Predicate -- C.2.1 A Motivating Discussion -- C.2.2 Back to the Formal Argument -- D. Related Surveys by the Author You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fas cinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat interwoven domains (i.e., cryptography, proofs and randomness). Modern Cryptography. Whereas classical cryptography was confined to the art of designing and breaking encryption schemes (or "secrecy codes"), Modern Cryptography is concerned with the rigorous analysis of any system which should withstand malicious attempts to abuse it. We emphasize two aspects of the transition from classical to modern cryptography: ( 1) the wide ning of scope from one specific task to an utmost wide general class of tasks; and (2) the move from an engineering-art which strives on ad-hoc tricks to a scientific discipline based on rigorous approaches and techniques HTTP:URL=https://doi.org/10.1007/978-3-662-12521-2 |
目次/あらすじ
所蔵情報を非表示
電子ブック | 配架場所 | 資料種別 | 巻 次 | 請求記号 | 状 態 | 予約 | コメント | ISBN | 刷 年 | 利用注記 | 指定図書 | 登録番号 |
---|---|---|---|---|---|---|---|---|---|---|---|---|
電子ブック | オンライン | 電子ブック |
|
Springer eBooks | 9783662125212 |
|
電子リソース |
|
EB00230058 |
類似資料
この資料の利用統計
このページへのアクセス回数:2回
※2017年9月4日以降