Discusses how formal analysis of cryptographic protocols is very important for securing communication and processing information
Introduces the reader to several formal verification methods and software commonly used today
Covers general knowledge on cryptographic primitives and formal reasoning as basic blocks to understanding protocols
Focuses on post-quantum cryptographic schemes
Presents how this topic is significant in daily life such as online banking, instant messaging, etc.
Reihe
Auflage
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
21 Tables, black and white; 45 Line drawings, black and white; 45 Illustrations, black and white
ISBN-13
978-1-000-95547-7 (9781000955477)
Schlagworte
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Thema Klassifikation
DNB DDC Sachgruppen
Dewey Decimal Classfication (DDC)
BIC 2 Klassifikation
BISAC Klassifikation
Sedat Akleylek received the B.Sc. degree in Mathematics majored in Computer Science from Ege University in 2004 in Izmir, Turkey, M.Sc. and Ph.D. degrees in Cryptography from Middle East Technical University in 2008 and 2010, in Ankara, Turkey, respectively. He is currently employed as an associate professor at the Department of Computer Engineering, Ondokuz Mayis University, Samsun, Turkey since 2016. His research interests include in the areas of post-quantum cryptography, algorithms, cryptographic protocols, and architectures for computations in finite fields. He has published more than 20 papers on those topics and presented his work at more than 45 conference papers. He is involved in several nationally and internationally funded research projects on cryptography focusing post-quantum ones.
Besik Dundua is an expert in formal methods. He received his PhD degree from the University of Porto in computer science. Afterwards, he worked as a postdoc and visiting researcher in Brazil (University of Brasilia), Austria (Johannes Kepler University Linz), and Germany (The University of Stuttgart). His work concerns various aspects of verification, computational logic, and formal languages: foundational formalisms, computational mechanisms, and implementation ideas. He has published more than 20 papers on those topics and presented his work at more than 30 conference.
1. Development of Cryptography since Shannon. 2. Introduction to Formal Methods for the Analysis and Design of Protocols. 3. An Introduction to Tools for Formal Analysis of Cryptographic Protocols. 4. Formal Verification of Cryptographic Protocols with Isabelle/HOL. 5. Formal Modelling and Security Analysis of Security Protocols. 6. Cryptographic Web Applications: from Security Engineering to Formal Analysis. 7. Formal Methods for Quantum Algorithms.
Dateiformat: PDF
Kopierschutz: ohne DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist.
Ein Kopierschutz bzw. Digital Rights Management wird bei diesem E-Book nicht eingesetzt.
Weitere Informationen finden Sie in unserer E-Book Hilfe.