{"id":23923,"date":"2024-01-14T15:01:47","date_gmt":"2024-01-14T15:01:47","guid":{"rendered":"https:\/\/www.istegroup.com\/?post_type=product&#038;p=23923"},"modified":"2025-01-03T11:03:08","modified_gmt":"2025-01-03T11:03:08","slug":"cryptographie-asymetrique","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/","title":{"rendered":"Cryptographie asym\u00e9trique"},"content":{"rendered":"<p>La cryptographie asym\u00e9trique introduite par Diffie et Hellman en 1976 a \u00e9t\u00e9 rapidement mise en oeuvre avec des constructions de chiffrement et de signature. Cela a conduit \u00e0 un tout nouveau domaine de recherche, avec des d\u00e9finitions formelles et des mod\u00e8les de s\u00e9curit\u00e9. Depuis lors, des outils impressionnants ont \u00e9t\u00e9 d\u00e9velopp\u00e9s, avec des propri\u00e9t\u00e9s innovatrices, notamment en exploitant les couplages sur les courbes elliptiques.<\/p>\n<p><em>Cryptographie asym\u00e9trique<\/em> pr\u00e9sente le chiffrement \u00e0 cl\u00e9 publique et la signature, puis les primitives de base de la cryptographie asym\u00e9trique. Il analyse ensuite la notion de s\u00e9curit\u00e9 prouvable, qui d\u00e9finit le fait d\u2019\u00eatre \u00ab s\u00e9curis\u00e9 \u00bb pour un sch\u00e9ma cryptographique. En outre, une s\u00e9lection de protocoles est propos\u00e9e, avec notamment les preuves \u00e0 divulgation nulle de connaissance, le calcul multi-parties et l\u2019\u00e9change de cl\u00e9. Apr\u00e8s un rappel sur la cryptographie bas\u00e9e sur les couplages, cet ouvrage expose des sch\u00e9mas cryptographiques avanc\u00e9s pour la confidentialit\u00e9 et l\u2019authentification, avec des propri\u00e9t\u00e9s suppl\u00e9mentaires, tels que des signatures anonymes et du chiffrement multi-receveurs. Enfin, il traite le sujet plus r\u00e9cent du calcul v\u00e9rifiable.<\/p>","protected":false},"excerpt":{"rendered":"<p>La cryptographie asym\u00e9trique introduite par Diffie et Hellman en 1976 a \u00e9t\u00e9 rapidement mise en oeuvre avec des constructions de chiffrement et de signature. Cela a conduit \u00e0 un tout nouveau domaine de recherche, avec des d\u00e9finitions formelles et des mod\u00e8les de s\u00e9curit\u00e9. Depuis lors, des outils impressionnants ont \u00e9t\u00e9 d\u00e9velopp\u00e9s, avec des propri\u00e9t\u00e9s innovatrices, [&hellip;]<\/p>\n","protected":false},"featured_media":55136,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[4289],"product_tag":[],"class_list":{"0":"post-23923","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-sciences","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptographie asym\u00e9trique - ISTE Group<\/title>\n<meta name=\"description\" content=\"Cryptographie asym\u00e9trique pr\u00e9sente le chiffrement \u00e0 cl\u00e9 publique et la signature, puis les primitives de base de la cryptographie asym\u00e9trique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptographie asym\u00e9trique - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"Cryptographie asym\u00e9trique pr\u00e9sente le chiffrement \u00e0 cl\u00e9 publique et la signature, puis les primitives de base de la cryptographie asym\u00e9trique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T11:03:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/\",\"url\":\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/\",\"name\":\"Cryptographie asym\u00e9trique - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg\",\"datePublished\":\"2024-01-14T15:01:47+00:00\",\"dateModified\":\"2025-01-03T11:03:08+00:00\",\"description\":\"Cryptographie asym\u00e9trique pr\u00e9sente le chiffrement \u00e0 cl\u00e9 publique et la signature, puis les primitives de base de la cryptographie asym\u00e9trique.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg\",\"width\":300,\"height\":450,\"caption\":\"Livre scientifique - Cryptographie asym\u00e9trique\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cryptographie asym\u00e9trique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"\u00c9diteur des Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptographie asym\u00e9trique - ISTE Group","description":"Cryptographie asym\u00e9trique pr\u00e9sente le chiffrement \u00e0 cl\u00e9 publique et la signature, puis les primitives de base de la cryptographie asym\u00e9trique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/","og_locale":"fr_FR","og_type":"article","og_title":"Cryptographie asym\u00e9trique - ISTE Group","og_description":"Cryptographie asym\u00e9trique pr\u00e9sente le chiffrement \u00e0 cl\u00e9 publique et la signature, puis les primitives de base de la cryptographie asym\u00e9trique.","og_url":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/","og_site_name":"ISTE Group","article_modified_time":"2025-01-03T11:03:08+00:00","og_image":[{"width":300,"height":450,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/","url":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/","name":"Cryptographie asym\u00e9trique - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg","datePublished":"2024-01-14T15:01:47+00:00","dateModified":"2025-01-03T11:03:08+00:00","description":"Cryptographie asym\u00e9trique pr\u00e9sente le chiffrement \u00e0 cl\u00e9 publique et la signature, puis les primitives de base de la cryptographie asym\u00e9trique.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/Cryptographie-asymetrique.jpeg","width":300,"height":450,"caption":"Livre scientifique - Cryptographie asym\u00e9trique"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/fr\/produit\/cryptographie-asymetrique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"Cryptographie asym\u00e9trique"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"\u00c9diteur des Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product\/23923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media\/55136"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media?parent=23923"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_brand?post=23923"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_cat?post=23923"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_tag?post=23923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}