Menezes A.J., Oorschot P.C., Vanstone S.A.
Table of contents :
Title……Page 1
forward……Page 2
preface……Page 4
Contents……Page 10
1.1 Introduction……Page 19
1.2 Information Security……Page 20
1.3 Functions……Page 24
1.4 Terminology……Page 29
1.5 Symmetric-key Encryption……Page 33
1.6 Digital Signatures……Page 40
1.7 Authentication……Page 42
1.8 Public-key cryptography……Page 43
1.10 Protocols……Page 51
1.11 Key Management……Page 53
1.12 Random Numbers……Page 57
1.13 Security Attacks……Page 59
1.14 References……Page 63
2. Math Background……Page 67
2.1 Probability Theory……Page 68
2.2 Information Theory……Page 74
2.3 Complexity Theory……Page 75
2.4 Number Theory……Page 81
2.5 Abstract Algebra……Page 93
2.6 Finite Fields……Page 98
2.7 References……Page 103
3.1 Introduction……Page 105
3.2 Integer Factorization……Page 107
3.3 RSA Problem……Page 116
3.5 Square Roots……Page 117
3.6 Discrete Logs……Page 121
3.7 Diffie-Hellman……Page 131
3.9 Computing Bits……Page 132
3.10 Subset Sum……Page 135
3.11 Factoring Polynomials……Page 140
3.12 References……Page 143
4.1 Introduction……Page 151
4.2 Primality Tests……Page 153
4.3 Proving Primality……Page 160
4.4 Generating Primes……Page 163
4.5 Irreducible Polynomials……Page 172
4.6 Generators……Page 178
4.7 References……Page 183
5. Random Numbers……Page 187
6. Stream Ciphers……Page 209
7. Block Ciphers……Page 241
8. Public-Key Encryption……Page 301
9. Hash Functions……Page 338
10. Authentication……Page 401
11. Digital Signatures……Page 441
12. Key Protocols……Page 505
13. Key Management……Page 558
14. Efficient Algorithms……Page 606
15. Patents & Standards……Page 650
A.1 Asiacrypt Proceedings……Page 677
A.2 Crypto Proceedings……Page 681
A.3 Eurocrypt Proceedings……Page 698
A.4 Fast Encryption Proceedings……Page 712
A.5 Journal of Cryptology……Page 714
References……Page 717
Index……Page 769
Reviews
There are no reviews yet.