ISBN13: | 9780367546663 |
ISBN10: | 0367546663 |
Binding: | Paperback |
No. of pages: | 444 pages |
Size: | 234x156 mm |
Weight: | 453 g |
Language: | English |
Illustrations: | 45 Illustrations, black & white; 45 Line drawings, black & white; 21 Tables, black & white |
700 |
The basics of mathematics and mathematical logic
Analysis
Engineering in general
Electrical engineering and telecommunications, precision engineering
Energy industry
Theory of computing, computing in general
Computer networks in general
Privacy, data security
Safety and health aspects of computing
Computing's and information technology's impact on society
Product design
The basics of mathematics and mathematical logic (charity campaign)
Analysis (charity campaign)
Engineering in general (charity campaign)
Electrical engineering and telecommunications, precision engineering (charity campaign)
Energy industry (charity campaign)
Theory of computing, computing in general (charity campaign)
Computer networks in general (charity campaign)
Privacy, data security (charity campaign)
Safety and health aspects of computing (charity campaign)
Computing's and information technology's impact on society (charity campaign)
Product design (charity campaign)
Handbook of Formal Analysis and Verification in Cryptography
GBP 61.99
Click here to subscribe.
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols.
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols. The chapters give readers general knowledge and formal methods focusing on cryptographic protocols.
Handbook of Formal Analysis and Verification in Cryptography includes major formalisms and tools used for formal verification of cryptography, with a spotlight on new-generation cryptosystems such as post-quantum, and presents a connection between formal analysis and cryptographic schemes. The text offers formal methods to show whether security assumptions are valid and compares the most prominent formalism and tools as they outline common challenges and future research directions.
Graduate students, researchers, and engineers worldwide will find this an exciting read.
1. Development of Cryptography since Shannon. 2. Introduction to Formal Methods for the Analysis and Design of Protocols. 3. An Introduction to Tools for Formal Analysis of Cryptographic Protocols. 4. Formal Verification of Cryptographic Protocols with Isabelle/HOL. 5. Formal Modelling and Security Analysis of Security Protocols. 6. Cryptographic Web Applications: from Security Engineering to Formal Analysis. 7. Formal Methods for Quantum Algorithms.