Schneier Applied Cryptography Algorithms And Code In C, 2Nd Ed.pdf


文档分类:管理/人力资源 | 页数:约666页 举报非法文档有奖
1/666
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/666
文档列表 文档介绍
Applied Cryptography: Second Edition - Bruce Schneier
Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C
by Bruce Schneier
puter Publishing, John Wiley & Sons, Inc.
ISBN: 0471128457 Pub Date: 01/01/96
Foreword By Whitfield Diffie
Preface
About the Author
Chapter 1—Foundations
Terminology
Steganography
Substitution Ciphers and Transposition Ciphers
Simple XOR
One-Time Pads
Algorithms
Large Numbers
Part I—Cryptographic Protocols
Chapter 2—Protocol Building Blocks
Introduction to Protocols
Using Symmetric Cryptography
One-Way Functions
One-Way Hash Functions
Using Public-Key Cryptography
Digital Signatures
Digital Signatures with Encryption
Random and Pseudo-Random-Sequence Generation
Chapter 3—Basic Protocols
Key Exchange
Authentication
Authentication and Key Exchange
Formal Analysis of Authentication and Key-Exchange Protocols
Multiple-Key Public-Key Cryptography
Secret Splitting
Secret Sharing
Cryptographic Protection of Databases
Chapter 4—Intermediate Protocols
Timestamping Services
Subliminal Channel
Undeniable Digital Signatures
Designated Confirmer Signatures
Proxy Signatures
Group Signatures
Fail-Stop Digital Signatures
with Encrypted Data
mitment
Fair Coin Flips
Mental Poker
One-Way Accumulators
All-or-Nothing Disclosure of Secrets
Page 1 of 666
Applied Cryptography: Second Edition - Bruce Schneier
Key Escrow
Chapter 5—Advanced Protocols
Zero-Knowledge Proofs
Zero-Knowledge Proofs of Identity
Blind Signatures
Identity-Based Public-Key Cryptography
Oblivious Transfer
Oblivious Signatures
Simultaneous Contract Signing
Digital Certified Mail
Simultaneous Exchange

Schneier Applied Cryptography Algorithms And Code In C, 2Nd Ed 来自淘豆网m.daumloan.com转载请标明出处.

非法内容举报中心
文档信息
  • 页数666
  • 收藏数0 收藏
  • 顶次数0
  • 上传人bolee65
  • 文件大小0 KB
  • 时间2014-02-06