TAILIEUCHUNG - Applied Crytography 2nd

The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same. | HOME ACCOUNT INFO SUBSCRIBE LOCIN SEARCH o MY ITKhtOw LE ME FAO SITEMAP CONTACT US Go Keyword Brief o Full Advanced Search Search Tips To access the contents click the chapter and section titles. Applied Cryptography Second Edition Protocols Algorthms and Source Code in C cloth Publisher John Wiley Sons Inc. Author s Bruce Schneier ISBN 0471128457 Publication Date 01 01 96 Search this book Foreword by Whitfield Diffie Preface About the Author Chapter 1 Foundations Terminology Steganography Substitution Ciphers and Transposition Ciphers Simple XOR One-Time Pads Computer Algorithms Large Numbers Part I Cryptographic Protocols Chapter 2 Protocol Building Blocks Introduction to Protocols Communications Using Symmetric Cryptography One-Way Functions One-Way Hash Functions Communications Using Public-Key Cryptography Digital Signatures Digital Signatures with Encryption Random and Pseudo-Random-Sequence Generation Chapter 3 Basic Protocols Key Exchange Authentication Authentication and Key Exchange Formal Analysis of Authentication and Key-Exchange Protocols Multiple-Key Public-Key Cryptography Secret Splitting Secret Sharing Cryptographic Protection of Databases Chapter 4 Intermediate Protocols Timestamping Services Subliminal Channel Undeniable Digital Signatures Designated Confirmer Signatures Proxy Signatures Group Signatures Fail-Stop Digital Signatures Computing with Encrypted Data Bit Commitment Fair Coin Flips Mental Poker One-Way Accumulators All-or-Nothing Disclosure of Secrets Key Escrow Chapter 5 Advanced Protocols Zero-Knowledge Proofs Zero-Knowledge Proofs of Identity Blind Signatures Identity-Based Public-Key Cryptography Oblivious Transfer Oblivious Signatures Simultaneous Contract Signing Digital Certified Mail Simultaneous Exchange of Secrets Chapter 6 Esoteric .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.