欢迎来到天天文库
浏览记录
ID:8076372
大小:8.89 MB
页数:666页
时间:2018-03-05
《schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、AppliedCryptography:SecondEdition-BruceSchneierAppliedCryptography,SecondEdition:Protocols,Algorthms,andSourceCodeinCbyBruceSchneierWileyComputerPublishing,JohnWiley&Sons,Inc.ISBN:0471128457PubDate:01/01/96ForewordByWhitfieldDiffiePrefaceAbouttheAuthorChapter1—Foundations1.1T
2、erminology1.2Steganography1.3SubstitutionCiphersandTranspositionCiphers1.4SimpleXOR1.5One-TimePads1.6ComputerAlgorithms1.7LargeNumbersPartI—CryptographicProtocolsChapter2—ProtocolBuildingBlocks2.1IntroductiontoProtocols2.2CommunicationsUsingSymmetricCryptography2.3One-WayFunc
3、tions2.4One-WayHashFunctions2.5CommunicationsUsingPublic-KeyCryptography2.6DigitalSignatures2.7DigitalSignatureswithEncryption2.8RandomandPseudo-Random-SequenceGenerationChapter3—BasicProtocols3.1KeyExchange3.2Authentication3.3AuthenticationandKeyExchange3.4FormalAnalysisofAu
4、thenticationandKey-ExchangeProtocols3.5Multiple-KeyPublic-KeyCryptography3.6SecretSplitting3.7SecretSharing3.8CryptographicProtectionofDatabasesChapter4—IntermediateProtocols4.1TimestampingServices4.2SubliminalChannel4.3UndeniableDigitalSignatures4.4DesignatedConfirmerSignatu
5、res4.5ProxySignatures4.6GroupSignatures4.7Fail-StopDigitalSignatures4.8ComputingwithEncryptedData4.9BitCommitment4.10FairCoinFlips4.11MentalPoker4.12One-WayAccumulators4.13All-or-NothingDisclosureofSecretsPage1of666AppliedCryptography:SecondEdition-BruceSchneier4.14KeyEscrowC
6、hapter5—AdvancedProtocols5.1Zero-KnowledgeProofs5.2Zero-KnowledgeProofsofIdentity5.3BlindSignatures5.4Identity-BasedPublic-KeyCryptography5.5ObliviousTransfer5.6ObliviousSignatures5.7SimultaneousContractSigning5.8DigitalCertifiedMail5.9SimultaneousExchangeofSecretsChapter6—Es
7、otericProtocols6.1SecureElections6.2SecureMultipartyComputation6.3AnonymousMessageBroadcast6.4DigitalCashPartII—CryptographicTechniquesChapter7—KeyLength7.1SymmetricKeyLength7.2Public-KeyKeyLength7.3ComparingSymmetricandPublic-KeyKeyLength7.4BirthdayAttacksagainstOne-WayHashF
8、unctions7.5HowLongShouldaKeyBe?7.6CaveatEmptorChapter8—KeyManagement
此文档下载收益归作者所有