1 / 907
文档名称:

C.applied.cryptography.protocols.algorithms.and.source.code.second.edition.pdf

格式:pdf   页数:907
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

C.applied.cryptography.protocols.algorithms.and.source.code.second.edition.pdf

上传人:bolee65 2014/2/4 文件大小:0 KB

下载得到文件列表

C.applied.cryptography.protocols.algorithms.and.source.code.second.edition.pdf

文档介绍

文档介绍:APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Table of Contents
Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
(Publisher: John Wiley & Sons, Inc.)
Author(s): Bruce Schneier
ISBN: 0471128457
Publication Date: 01/01/96
Foreword by Whitfield Diffie
Preface
About the Author
Chapter 1—Foundations
Terminology
Steganography
Substitution Ciphers and Transposition Ciphers
Simple XOR
One-Time Pads
Algorithms
Large Numbers
Part I—Cryptographic Protocols
Chapter 2—Protocol Building Blocks
Introduction to Protocols
Using Symmetric Cryptography
One-Way Functions
One-Way Hash Functions
Using Public-Key Cryptography
Digital Signatures
Digital Signatures with Encryption
Random and Pseudo-Random-Sequence Generation
Chapter 3—Basic Protocols
Key Exchange
Authentication
Authentication and Key Exchange
Formal Analysis of Authentication and Key-Exchange Protocols
Multiple-Key Public-Key Cryptography
Secret Splitting
Secret Sharing
Cryptographic Protection of Databases
Chapter 4—Intermediate Protocols
Timestamping Services
Subliminal Channel
Undeniable Digital Signatures
http://bookshelf./files/APPLIED_CRYPTOGRAPHY,_SECOND_EDITION/ (1 of 8) [2003-6-1 8:38:40]
APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Table of Contents
Designated Confirmer Signatures
Proxy Signatures
Group Signatures
Fail-Stop Digital Signatures
with Encrypted Data
mitment
Fair Coin Flips
Mental Poker
One-Way Accumulators
All-or-Nothing Disclosure of Secrets
Key Escrow
Chapter 5—Advanced Protocols
Zero-Knowledge Proofs
Zero-Knowledge Proofs of Identity