Cryptography - Theory And Practice.pdf


文档分类:管理/人力资源 | 页数:约573页 举报非法文档有奖
1/573
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/573
文档列表 文档介绍
Cryptography: Theory and Practice:Table of Contents
Cryptography: Theory and Practice
by Douglas Stinson
CRC Press, CRC Press LLC
ISBN: 0849385210 Pub
Date: 03/17/95
Preface
Dedication
Chapter 1—Classical Cryptography
Introduction: Some Simple Cryptosystems
The Shift Cipher
The Substitution Cipher
The Affine Cipher
The Vigenere Cipher
The Hill Cipher
The Permutation Cipher
Stream Ciphers
Cryptanalysis
Cryptanalysis of the Affine Cipher
Cryptanalysis of the Substitution Cipher
Cryptanalysis of the Vigenere Cipher
Cryptanalysis of the LFSR-based Stream Cipher
Notes
Exercises
Chapter 2—Shannon’s Theory
Perfect Secrecy
Entropy
Huffman Encodings and Entropy
Properties of Entropy
Spurious Keys and Unicity Distance
Product Cryptosystems
Notes
Exercises
Chapter 3—The Data Encryption Standard
Introduction
Description of DES
file:///D|/My%20Files/eBooks/_Government%20Publications/Cryptography%20Theory%20and%20Practice/ (1 of 5)12/6/2003 9:16:55 AM
Cryptography: Theory and Practice:Table of Contents
An Example of DES Encryption
The DES Controversy
DES in Practice
DES Modes of Operation
A Time-memory Trade-off
Differential Cryptanalysis
An Attack on a 3-round DES
An Attack on a 6-round DES
Other examples of Differential Cryptanalysis
Notes and References
Exercises
Chapter 4—The RSA System and Factoring
Introduction to Public-key Cryptography
More Number Theory
The Euclidean Algorithm
The Chinese Remainder Theorem
Other Useful Facts
The RSA Cryptosystem
Implementing RSA
Probabilistic Primality Testing
Attacks On RSA
The Decryption Exponent
Partial Information Concerning Plaintext B

Cryptography - Theory And Practice 来自淘豆网www.taodocs.com转载请标明出处.

非法内容举报中心
文档信息
  • 页数573
  • 收藏数0 收藏
  • 顶次数0
  • 上传人kuo08091
  • 文件大小0 KB
  • 时间2014-12-17