schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书

schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书

ID:8076372

大小:8.89 MB

页数:666页

时间:2018-03-05

schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书_第1页
schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书_第2页
schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书_第3页
schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书_第4页
schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书_第5页
资源描述:

《schneier applied cryptography algorithms and code in c, 2nd ed外语英文电子书》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库

1、AppliedCryptography:SecondEdition-BruceSchneierAppliedCryptography,SecondEdition:Protocols,Algorthms,andSourceCodeinCbyBruceSchneierWileyComputerPublishing,JohnWiley&Sons,Inc.ISBN:0471128457PubDate:01/01/96ForewordByWhitfieldDiffiePrefaceAbouttheAuthorChapter1—Foundations1.1T

2、erminology1.2Steganography1.3SubstitutionCiphersandTranspositionCiphers1.4SimpleXOR1.5One-TimePads1.6ComputerAlgorithms1.7LargeNumbersPartI—CryptographicProtocolsChapter2—ProtocolBuildingBlocks2.1IntroductiontoProtocols2.2CommunicationsUsingSymmetricCryptography2.3One-WayFunc

3、tions2.4One-WayHashFunctions2.5CommunicationsUsingPublic-KeyCryptography2.6DigitalSignatures2.7DigitalSignatureswithEncryption2.8RandomandPseudo-Random-SequenceGenerationChapter3—BasicProtocols3.1KeyExchange3.2Authentication3.3AuthenticationandKeyExchange3.4FormalAnalysisofAu

4、thenticationandKey-ExchangeProtocols3.5Multiple-KeyPublic-KeyCryptography3.6SecretSplitting3.7SecretSharing3.8CryptographicProtectionofDatabasesChapter4—IntermediateProtocols4.1TimestampingServices4.2SubliminalChannel4.3UndeniableDigitalSignatures4.4DesignatedConfirmerSignatu

5、res4.5ProxySignatures4.6GroupSignatures4.7Fail-StopDigitalSignatures4.8ComputingwithEncryptedData4.9BitCommitment4.10FairCoinFlips4.11MentalPoker4.12One-WayAccumulators4.13All-or-NothingDisclosureofSecretsPage1of666AppliedCryptography:SecondEdition-BruceSchneier4.14KeyEscrowC

6、hapter5—AdvancedProtocols5.1Zero-KnowledgeProofs5.2Zero-KnowledgeProofsofIdentity5.3BlindSignatures5.4Identity-BasedPublic-KeyCryptography5.5ObliviousTransfer5.6ObliviousSignatures5.7SimultaneousContractSigning5.8DigitalCertifiedMail5.9SimultaneousExchangeofSecretsChapter6—Es

7、otericProtocols6.1SecureElections6.2SecureMultipartyComputation6.3AnonymousMessageBroadcast6.4DigitalCashPartII—CryptographicTechniquesChapter7—KeyLength7.1SymmetricKeyLength7.2Public-KeyKeyLength7.3ComparingSymmetricandPublic-KeyKeyLength7.4BirthdayAttacksagainstOne-WayHashF

8、unctions7.5HowLongShouldaKeyBe?7.6CaveatEmptorChapter8—KeyManagement

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。