Practical Cryptography
-15%
portes grátis
Practical Cryptography
Ferguson, Niels; Schneier, Bruce
John Wiley & Sons Inc
04/2003
432
Mole
Inglês
9780471223573
15 a 20 dias
778
Descrição não disponível.
Preface. 1. Our Design Philosophy.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
11. Primes.
12. Diffie-Hellman.
13. RSA.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
IV Miscellaneous.
23. Standards.
24. Patents.
25. Involving Experts.
Acknowledgments.
Bibliography.
Index.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
11. Primes.
12. Diffie-Hellman.
13. RSA.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
IV Miscellaneous.
23. Standards.
24. Patents.
25. Involving Experts.
Acknowledgments.
Bibliography.
Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
teach; experts; worlds; todays; future; cryptography; top; world; digital; concern; worldwide; computer system; secure; money; technology; holds; promise; great; cyberspace; literature; realworld; implement; systems; practical
Preface. 1. Our Design Philosophy.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
11. Primes.
12. Diffie-Hellman.
13. RSA.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
IV Miscellaneous.
23. Standards.
24. Patents.
25. Involving Experts.
Acknowledgments.
Bibliography.
Index.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
11. Primes.
12. Diffie-Hellman.
13. RSA.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
IV Miscellaneous.
23. Standards.
24. Patents.
25. Involving Experts.
Acknowledgments.
Bibliography.
Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.