Schneier Applied Cryptography Algorithms And Code In C, 2Nd Ed.pdf
Applied Cryptography: Second Edition - Bruce Schneier Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Bruce Schneier puter Publishing, John Wiley & Sons, Inc. ISBN: 0471128457 Pub Date: 01/01/96 Foreword By Whitfield Diffie Preface About the Author Chapter 1—Foundations Terminology Steganography Substitution Ciphers and Transposition Ciphers Simple XOR One-Time Pads Algorithms Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks Introduction to Protocols Using Symmetric Cryptography One-Way Functions One-Way Hash Functions Using Public-Key Cryptography Digital Signatures Digital Signatures with Encryption Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols Key Exchange Authentication Authentication and Key Exchange Formal Analysis of Authentication and Key-Exchange Protocols Multiple-Key Public-Key Cryptography Secret Splitting Secret Sharing Cryptographic Protection of Databases Chapter 4—Intermediate Protocols Timestamping Services Subliminal Channel Undeniable Digital Signatures Designated Confirmer Signatures Proxy Signatures Group Signatures Fail-Stop Digital Signatures with Encrypted Data mitment Fair Coin Flips Mental Poker One-Way Accumulators All-or-Nothing Disclosure of Secrets Page 1 of 666 Applied Cryptography: Second Edition - Bruce Schneier Key Escrow Chapter 5—Advanced Protocols Zero-Knowledge Proofs Zero-Knowledge Proofs of Identity Blind Signatures Identity-Based Public-Key Cryptography Oblivious Transfer Oblivious Signatures Simultaneous Contract Signing Digital Certified Mail Simultaneous Exchange
Schneier Applied Cryptography Algorithms And Code In C, 2Nd Ed 来自淘豆网m.daumloan.com转载请标明出处.