Douglas Stinson9780849385216, 0849385210
Table of contents :
Local Disk……Page 0
Cryptography: Theory and Practice:Table of Contents……Page 1
Cryptography: Theory and Practice:Preface……Page 6
Cryptography: Theory and Practice:Dedication……Page 10
Cryptography: Theory and Practice:Classical Cryptography……Page 11
Cryptography: Theory and Practice:Classical Cryptography……Page 14
Cryptography: Theory and Practice:Classical Cryptography……Page 17
Cryptography: Theory and Practice:Classical Cryptography……Page 21
Cryptography: Theory and Practice:Classical Cryptography……Page 26
Cryptography: Theory and Practice:Classical Cryptography……Page 31
Cryptography: Theory and Practice:Classical Cryptography……Page 36
Cryptography: Theory and Practice:Classical Cryptography……Page 40
Cryptography: Theory and Practice:Classical Cryptography……Page 44
Cryptography: Theory and Practice:Classical Cryptography……Page 47
Cryptography: Theory and Practice:Classical Cryptography……Page 50
Cryptography: Theory and Practice:Classical Cryptography……Page 53
Cryptography: Theory and Practice:Classical Cryptography……Page 58
Cryptography: Theory and Practice:Classical Cryptography……Page 63
Cryptography: Theory and Practice:Shannon’s Theory……Page 70
Cryptography: Theory and Practice:Shannon’s Theory……Page 75
Cryptography: Theory and Practice:Shannon’s Theory……Page 80
Cryptography: Theory and Practice:Shannon’s Theory……Page 83
Cryptography: Theory and Practice:Shannon’s Theory……Page 87
Cryptography: Theory and Practice:Shannon’s Theory……Page 92
Cryptography: Theory and Practice:Shannon’s Theory……Page 95
Cryptography: Theory and Practice:Shannon’s Theory……Page 99
Cryptography: Theory and Practice:Shannon’s Theory……Page 103
Cryptography: Theory and Practice:The Data Encryption Standard……Page 106
Cryptography: Theory and Practice:The Data Encryption Standard……Page 109
Cryptography: Theory and Practice:The Data Encryption Standard……Page 111
Cryptography: Theory and Practice:The Data Encryption Standard……Page 114
Cryptography: Theory and Practice:The Data Encryption Standard……Page 119
Cryptography: Theory and Practice:The Data Encryption Standard……Page 125
Cryptography: Theory and Practice:The Data Encryption Standard……Page 128
Cryptography: Theory and Practice:The Data Encryption Standard……Page 131
Cryptography: Theory and Practice:The Data Encryption Standard……Page 138
Cryptography: Theory and Practice:The Data Encryption Standard……Page 142
Cryptography: Theory and Practice:The Data Encryption Standard……Page 146
Cryptography: Theory and Practice:The Data Encryption Standard……Page 149
Cryptography: Theory and Practice:The Data Encryption Standard……Page 153
Cryptography: Theory and Practice:The Data Encryption Standard……Page 161
Cryptography: Theory and Practice:The RSA System and Factoring……Page 165
Cryptography: Theory and Practice:The RSA System and Factoring……Page 168
Cryptography: Theory and Practice:The RSA System and Factoring……Page 172
Cryptography: Theory and Practice:The RSA System and Factoring……Page 176
Cryptography: Theory and Practice:The RSA System and Factoring……Page 181
Cryptography: Theory and Practice:The RSA System and Factoring……Page 184
Cryptography: Theory and Practice:The RSA System and Factoring……Page 187
Cryptography: Theory and Practice:The RSA System and Factoring……Page 190
Cryptography: Theory and Practice:The RSA System and Factoring……Page 196
Cryptography: Theory and Practice:The RSA System and Factoring……Page 200
Cryptography: Theory and Practice:The RSA System and Factoring……Page 203
Cryptography: Theory and Practice:The RSA System and Factoring……Page 208
Cryptography: Theory and Practice:The RSA System and Factoring……Page 211
Cryptography: Theory and Practice:The RSA System and Factoring……Page 214
Cryptography: Theory and Practice:The RSA System and Factoring……Page 218
Cryptography: Theory and Practice:The RSA System and Factoring……Page 222
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 230
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 234
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 241
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 247
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 251
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 256
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 260
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 265
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 270
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 273
Cryptography: Theory and Practice:Signature Schemes……Page 280
Cryptography: Theory and Practice:Signature Schemes……Page 283
Cryptography: Theory and Practice:Signature Schemes……Page 288
Cryptography: Theory and Practice:Signature Schemes……Page 293
Cryptography: Theory and Practice:Signature Schemes……Page 297
Cryptography: Theory and Practice:Signature Schemes……Page 302
Cryptography: Theory and Practice:Signature Schemes……Page 309
Cryptography: Theory and Practice:Signature Schemes……Page 314
Cryptography: Theory and Practice:Hash Functions……Page 317
Cryptography: Theory and Practice:Hash Functions……Page 320
Cryptography: Theory and Practice:Hash Functions……Page 324
Cryptography: Theory and Practice:Hash Functions……Page 331
Cryptography: Theory and Practice:Hash Functions……Page 337
Cryptography: Theory and Practice:Hash Functions……Page 341
Cryptography: Theory and Practice:Hash Functions……Page 345
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 349
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 352
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 357
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 362
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 365
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 371
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 376
Cryptography: Theory and Practice:Identification Schemes……Page 379
Cryptography: Theory and Practice:Identification Schemes……Page 383
Cryptography: Theory and Practice:Identification Schemes……Page 388
Cryptography: Theory and Practice:Identification Schemes……Page 392
Cryptography: Theory and Practice:Identification Schemes……Page 396
Cryptography: Theory and Practice:Identification Schemes……Page 402
Cryptography: Theory and Practice:Authentication Codes……Page 405
Cryptography: Theory and Practice:Authentication Codes……Page 408
Cryptography: Theory and Practice:Authentication Codes……Page 413
Cryptography: Theory and Practice:Authentication Codes……Page 421
Cryptography: Theory and Practice:Authentication Codes……Page 424
Cryptography: Theory and Practice:Authentication Codes……Page 430
Cryptography: Theory and Practice:Authentication Codes……Page 434
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 437
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 441
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 445
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 448
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 451
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 454
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 458
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 463
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 466
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 473
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 477
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 481
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 483
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 487
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 491
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 495
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 500
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 504
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 508
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 513
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 515
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 518
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 521
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 524
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 527
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 530
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 533
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 538
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 541
Cryptography: Theory and Practice:Further Reading……Page 543
Cryptography: Theory and Practice:Index……Page 559
Reviews
There are no reviews yet.