TAILIEUCHUNG - Ebook Modern Cryptography - Theory and Practice: Phần 1

Part 1 books Pc Underground give readers the knowledge overview: beginning with a simple communication game, wrestling between safeguard and attack, probability and information theory, computational complexity, algebraic foundations,. Invite you to consult. | Table of Contents Modern Cryptography Theory and Practice ByWenbo Mao Hewlett-Packard Company Publisher Prentice Hall PTR Pub Date July 25 2003 ISBN 0-13-066943-1 Pages 648 Many cryptographic schemes and protocols especially those based on public-keycryptography have basic or so-called textbook crypto versions as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography it pays much more attention tofit-for-application aspects of cryptography. It explains why textbook crypto isonly good in an ideal world where data are random and bad guys behave reveals the general unfitness of textbook crypto for the real world by demonstratingnumerous attacks on such schemes protocols and systems under variousreal-world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes protocols and systems many of them standards or de factoones studies them closely explains their working principles discusses their practicalusages and examines their strong . fit-for-application security properties oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography. Table of Contents Modern Cryptography Theory and Practice ByWenbo Mao Hewlett-Packard Company Publisher Prentice Hall PTR Pub Date July 25 2003 ISBN 0-13-066943-1 Pages 648 Copyright Hewlett-Packard Professional Books A Short Description of the Book Preface Scope Acknowledgements List of Figures List of Algorithms Protocols and Attacks Part I Introduction Chapter 1. Beginning with a Simple Communication Game Section . A Communication Game Section . Criteria for Desirable Cryptographic Systems and Protocols Section . Chapter Summary Exercises Chapter 2. Wrestling Between Safeguard and Attack Section . Introduction Section . Encryption Section . Vulnerable Environment the Dolev-Yao Threat

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.