ABSTRACT

Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes.

Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning.

Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks.

Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia.  In between 2009 – 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.

part I|178 pages

Fundamentals of Cryptography

chapter 21|10 pages

Introduction to Cryptography

chapter 2|14 pages

Structure of Security Proof

chapter 3|8 pages

Private-Key Encryption (1)

chapter 4|16 pages

Private-Key Encryption (2)

chapter 5|14 pages

Private-Key Encryption (3)

chapter 6|22 pages

Message Authentication Code

chapter 7|16 pages

Hash Function

chapter 8|14 pages

Introduction to Number Theory

chapter 9|42 pages

Public-Key Encryption

chapter 10|20 pages

Digital Signature

part II|232 pages

Identity-Based Encryption and Its Variants

chapter 180Chapter 11|18 pages

Identity-Based Encryption (1)

chapter 12|28 pages

Identity-Based Encryption (2)

chapter 13|30 pages

Identity-Based Encryption (3)

chapter 14|32 pages

Hierarchical Identity-Based Encryption

chapter 15|10 pages

Identity-Based Encryption (4)

chapter 16|10 pages

Tight Reduction

chapter 17|12 pages

Transformation Technique

chapter 18|28 pages

Broadcast Encryption

chapter 19|22 pages

Attribute-Based Encryption

chapter 20|8 pages

Secret Sharing

part III|50 pages

Post-Quantum Cryptography

chapter 41222|6 pages

Introduction to Lattice

chapter 23|14 pages

Lattice-Based Cryptography

chapter 24|16 pages

Introduction to Linear Codes

chapter 25|12 pages

Code-Based Cryptography

part IV|10 pages

Implementations of Selected Algorithms

chapter 46226|8 pages

Selected Algorithms