• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Handbook of formal analysis and verification in cryptography

پدید آورنده
/ edited by Sedat Akleylek, Besik Dundua.

موضوع
Cryptography.,Mathematical analysis.,Computer systems,Verification.

رده

کتابخانه
Library of College of Science University of Tehran

محل استقرار
استان: Tehran ـ شهر: Tehran

Library of College of Science University of Tehran

تماس با کتابخانه : 61112616-66495290-021

INTERNATIONAL STANDARD BOOK NUMBER

Qualification
(eISBN)
(Number (ISBN
9781000955491

NATIONAL BIBLIOGRAPHY NUMBER

Number
E4623

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی
Language of Original Work
English

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Handbook of formal analysis and verification in cryptography
General Material Designation
[electronic resources: book]
First Statement of Responsibility
/ edited by Sedat Akleylek, Besik Dundua.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton
Name of Publisher, Distributor, etc.
: CRC Press
Date of Publication, Distribution, etc.
, 2024.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource.

SERIES

Series Title
Prospects in pure and applied mathematics

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Development of cryptography since Shannon -- Introduction to formal methods for the analysis and design of cryptographic protocols -- An introduction to tools for formal analysis of cryptographic protocols -- Formal verification of cryptographic protocols with Isabelle/HOL -- Formal modelling and security analysis of security protocols -- Cryptographic Web applications : from security engineering to formal analysis -- Formal methods for quantum algorithms.
0

SUMMARY OR ABSTRACT

Text of Note
"Handbook of Formal Analysis and Verification in Cryptography includes major formalisms and tools used for formal verification of cryptography, with a focus on new generation cryptosystems such as post-quantum. It presents a connection between formal analysis and cryptographic schemes, offers formal methods to show whether security assumptions are valid or not for a cryptographic scheme, compares the most prominent formalism and tools, and outlines common challenges and future research directions"--

TYPE OF ELECTRONIC RESOURCE NOTE

Text of Note
PDF file.

TOPICAL NAME USED AS SUBJECT

Entry Element
Cryptography.
Entry Element
Mathematical analysis.
Entry Element
Computer systems
Topical Subdivision
Verification.

DEWEY DECIMAL CLASSIFICATION

Edition
23/eng20230918

PERSONAL NAME - SECONDARY RESPONSIBILITY

Entry Element
Akleylek, Sedat,
Entry Element
Dundua, Besik,
Relator Code
Editor
Relator Code
Editor

ORIGINATING SOURCE

Country
Iran
Agency
University of Tehran. Library of College of Science
Date of Transaction
20250216172952.0
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Date and Hour of Consultation and Access
UT_SCI_BL_DB_1005023_0001.pdf

e

BL
278840
1

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival