Crypto topics and applications II

Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Rei Safavi-Naini

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials ofeach topic. We have selected in the bibliography a list of representative items, which can be consulted for further details.
Original languageEnglish
Title of host publicationAlgorithms and theory of computation handbook
EditorsMikhail J. Atallah, Marina Blanton
Place of PublicationBoca Raton, Florida
PublisherCRC
Pages13-1-13-32
Number of pages32
Edition2nd
ISBN (Print)9781584888208
Publication statusPublished - 2010

Publication series

NameChapman & Hall/CRC applied algorithms and data structures series
PublisherCRC

Fingerprint

Dive into the research topics of 'Crypto topics and applications II'. Together they form a unique fingerprint.

Cite this