Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (Cloth)

Submitted by: Submitted by

Views: 410

Words: 110585

Pages: 443

Category: Science and Technology

Date Submitted: 04/04/2013 05:26 AM

Report This Essay

To access the contents, click the chapter and section titles.

Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)

Go!

Keyword

Brief Full Advanced Search Search Tips

(Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96

Search this book:

Go!

Foreword by Whitfield Diffie

-----------

Preface About the Author Chapter 1—Foundations

1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers

Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks

2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures

2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation

Chapter 3—Basic Protocols

3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases

Chapter 4—Intermediate Protocols

4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure of Secrets 4.14 Key Escrow

Chapter 5—Advanced Protocols

5.1 Zero-Knowledge Proofs 5.2 Zero-Knowledge Proofs of Identity 5.3 Blind Signatures 5.4 Identity-Based Public-Key Cryptography 5.5 Oblivious Transfer 5.6 Oblivious Signatures 5.7 Simultaneous Contract Signing

5.8 Digital Certified Mail 5.9 Simultaneous Exchange of Secrets

Chapter 6—Esoteric...