Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures
Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research
Contents: I. Preliminaries 1. The RSA Cryptosystem 2. Some Notation, Mathematics and Techniques II. Cryptanalysis of RSA 3. Some Early Attacks 4. Small Public Exponent Attacks 5. Small Private Exponent Attacks 6. Partial Key Exposure Attacks 7. More Small Private Exponent Attacks III. Cryptanalysis of Variants of RSA 8. Crt-Rsa 9. Multi-Prime RSA 10. Multi-Power RSA 1…
Termasuk bibliografi dan indeks. Guide to elliptic curve cryptography / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes. Computer security. Public key cryptography. ContentsList of Algorithms List of Tables List of Figures Acronyms CONTENTS: 1. Introduction 1.1 Encryption and Secrecy 1.2 The Objectives of Cryptography 1.3 Attacks 1.4 Cryptographic Protocols 1.5 P…
Daftar isi: Pendahuluan Sembilan hal penting untuk diketahui Langkah 1: Pasang dan gunakan program anti-virus Langkah 2: Lakukan patch pada sistem anda Langkah 3: Hati-hati dalam membaca email dengan attachment Langkah 4: Pasang dan gunakan program firewall Langkah 5: Lakukan backups untuk file dan folder penting Langkah 6: Gunakan password yang kuat Langkah 7: Hati-hati ketika downl…
DAFTAR ISI: 1. Sekilas jaringan wireless 1.1 Teknologi jaringan wireless 1.2 Mekanisme jaringan wireless 1.2.1 Beacon 1.2.2 Service set identifier (SSID) 1.2.3 Channel 1.2.4 Passive scanning 1.2.5 Autentifikasi dan association 1.2.6 Roaming 1.3 Seputar wireless dan hacking 2. Persiapan perang 2.1 Seputar chipset 2.2 Memeriksa chipset 2.3 Membongkar jeroan perangkat wireless …
Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…
Contents 1 Basic concepts and historical overview 2 Mathematical foundations of cryptography 3 Foundations of symmetric cryptography 4 Foundations of asymmetric cryptography 5 An electronic signature and hash functions 6 PGP Systems and truecrypt 7 Public key infrastructure 8 Cryptographic protocols 9 Cryptographic applications for network security
Contents Part I Introducing security metrics 1. What is a security metric 2. Designing effective security metrics 3. Understanding data Part II Implementing security metrics 4. The security process management framework 5. Analyzing security metrics data 6. Designing the security measurement project Part III Exploring security measurement projects 7. Measuring security operations…