tailieunhanh - Applied Crytography 2nd
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same. | HOME ACCOUNT INFO SUBSCRIBE LOCIN SEARCH o MY ITKhtOw LE ME FAO SITEMAP CONTACT US Go Keyword Brief o Full Advanced Search Search Tips To access the contents click the chapter and section titles. Applied Cryptography Second Edition Protocols Algorthms and Source Code in C cloth Publisher John Wiley Sons Inc. Author s Bruce Schneier ISBN 0471128457 Publication Date 01 01 96 Search this book Foreword by Whitfield Diffie Preface About the Author Chapter 1 Foundations Terminology Steganography Substitution Ciphers and Transposition Ciphers Simple XOR One-Time Pads Computer Algorithms Large Numbers Part I Cryptographic Protocols Chapter 2 Protocol Building Blocks Introduction to Protocols Communications Using Symmetric Cryptography One-Way Functions One-Way Hash Functions Communications Using Public-Key Cryptography Digital Signatures Digital Signatures with Encryption Random and Pseudo-Random-Sequence Generation Chapter 3 Basic Protocols Key Exchange Authentication Authentication and Key Exchange Formal Analysis of Authentication and Key-Exchange Protocols Multiple-Key Public-Key Cryptography Secret Splitting Secret Sharing Cryptographic Protection of Databases Chapter 4 Intermediate Protocols Timestamping Services Subliminal Channel Undeniable Digital Signatures Designated Confirmer Signatures Proxy Signatures Group Signatures Fail-Stop Digital Signatures Computing with Encrypted Data Bit Commitment Fair Coin Flips Mental Poker One-Way Accumulators All-or-Nothing Disclosure of Secrets Key Escrow Chapter 5 Advanced Protocols Zero-Knowledge Proofs Zero-Knowledge Proofs of Identity Blind Signatures Identity-Based Public-Key Cryptography Oblivious Transfer Oblivious Signatures Simultaneous Contract Signing Digital Certified Mail Simultaneous Exchange of Secrets Chapter 6 Esoteric .
đang nạp các trang xem trước