(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography

(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography

ID:32804769

大小:1.53 MB

页数:283页

时间:2019-02-15

(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography_第1页
(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography_第2页
(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography_第3页
(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography_第4页
(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography_第5页
资源描述:

《(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、IntroductiontoModernCryptographyMihirBellare1PhillipRogaway2May11,20051DepartmentofComputerScienceandEngineering,UniversityofCaliforniaatSanDiego,LaJolla,CA92093,USA.mihir@cs.ucsd.edu,http://www-cse.ucsd.edu/users/mihir2DepartmentofComputerScience,Kemper

2、HallofEngineering,UniversityofCaliforniaatDavis,Davis,CA95616,USA;andDepartmentofComputerScience,FacultyofScience,ChiangMaiUniversity,ChiangMai,50200Thailand.rogaway@cs.ucdavis.edu,http://www.cs.ucdavis.edu/∼rogaway2PrefaceThisisasetofclassnotesthatwehav

3、ebeendevelopingjointlyforsomeyears.Weusethemforcryptographycoursesthatweteachatourrespectiveinstitutions.Eachtimeoneofusteachestheclass,hetakesthetokenandupdatesthenotesabit.Theprocesshasresultedinanevolvingdocumentthathaslotsofgaps,aswellasplentyof“unha

4、rmonized”parts.Onedayitwill,withluck,becompleteandcogent.Theviewpointtakenthroughoutthesenotesistoemphasizethetheoryofcryptographyasitcanbeappliedtopractice.Thisisanapproachthatthetwoofushavepursuedinourresearch,anditseemstobeapedagogicallydesirableappro

5、achaswell.Wewouldliketothankthefollowingstudentsofpastversionsofourcourseswhohavepointedouterrorsandmadesuggestionsforchanges:AndreBarroso,KeithBell,KostasBimpikis,Alexan-draBoldyreva,DustinBoswell,BrianBuesker,MichaelBurton,ChrisCalabro,SashkaDavis,Alex

6、Gantman,BradleyHuffaker,HyunMinKang,VivekManpuria,ChanathipNamprempre,AdrianaPalacio,WenjingRao,FritzSchneider,JulianaWong.Wewelcomefurthercorrections,commentsandsuggestions.MihirBellareSanDiego,CaliforniaUSAPhillipRogawayDavis,CaliforniaUSAcMihirBellare

7、andPhillipRogaway,1997–2005.Contents1Introduction71.1Goalsandsettings.....................................71.2Othergoals.........................................131.3Whatcryptographyisabout................................161.4Approachestothestudyofcrypto

8、graphy........................181.5WhatbackgrounddoIneed?...............................251.6Problems..........................................252ClassicalEncryption292.1Substitutionciphers.................................

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。