Table of Contents THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. …
Introduction -- Black-Box Models of Computation -- On Black-Box Ring Extraction and Integer Factorization -- Analysis of Cryptographic Assumptions in the Generic Ring Model -- The Generic Composite Residuosity Problem -- Semi-Generic Groups and Their Applications.
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…
Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…
Brief Contents Chapter 1: The JCA and the JCE Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chapter 9: CMS and S/MIME Chapter 10: S…
Requirements on digital signature schemes History of digital signature schemes Information-theoretic security for signers: Introduction Terminology Properties of digital signature schemes Overview of existing schemes with other than ordinary security Conventional definitions of fail-stop signature schemes and general reductions Building blocks Constructions for one message block Signin…
Contents: Introduction. Part One: Exploring the World of Covert Communication. Chapter 1: Covert Communication: It’s All Around You. Chapter 2:” Cryptography Explained. Chapter 3 :Hiding the Goods with Steganography. Chapter 4: Digital Watermarking. Part Two: The Hidden Realm of Steganography. Chapter 5: Steganography at Large. Chapter 6: Nuts and Bolts of…
Contents: Chapter 1: A History of Cryptography 1 Chapter 2: Large Integer Computing 33 Chapter 3: The Integers 65 Chapter 4: Linear Diophantine Equations and Linear Congruences 89 Chapter 5: Linear Ciphers 105 Chapter 6: Systems of Linear Congruences—Single Modulus 125 Chapter 7: Matrix Ciphers 143 Chapter 8: Systems of Linear Congruences—Multiple Moduli 161 Chapter 9: Quadrati…
Contents: Chapter 1: The JCA and the JCE Chapter 2: Symmetric Key Cryptography Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chap…