- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Chapter 11: Message Integrity and Message Authentication
Objectives of Chapter 11: To define message integrity; to define message authentication; to define criteria for a cryptographic hash function; to define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions; to distinguish between an MDC and a MAC; to discuss some common MACs.
7 p vlute 16/11/2015 364 1
Từ khóa: Message Integrity, Message Authentication, Message integrity, Message authentication, An toàn thông tin, Bảo mật thông tin
Chapter 6: Lecture Data Encryption Standard (DES)
Objectives of Chapter 6: To review a short history of DES; to define the basic structure of DES; to describe the details of building elements of DES; to describe the round keys generation process; to analyze DES.
11 p vlute 16/11/2015 414 1
Từ khóa: Data Encryption Standard, Basic structure of DES, Analyze DES, Transposition ciphers, An toàn thông tin, Bảo mật thông tin
Chapter 10: Elliptic Curve Cryptography
This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.
14 p vlute 16/11/2015 461 1
Từ khóa: Elliptic Curve Cryptography, Elliptic Curves, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Bảo mật thông tin
Chapter 3: Traditional Symmetric-Key Ciphers
Objectives of Chapter 3: To define the terms and the concepts of symmetric key ciphers; to emphasize the two categories of traditional ciphers: substitution and transposition ciphers; to describe the categories of cryptanalysis used to break the symmetric ciphers.
12 p vlute 16/11/2015 345 1
Từ khóa: Symmetric-Key Ciphers, Symmetric ciphers, Elliptic Curve Cryptosystems, Transposition ciphers, An toàn thông tin, Bảo mật thông tin
Chapter 10: Symmetric-Key Cryptography
Objectives of Chapter 7: To distinguish between two cryptosystems; to introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; to introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography; to discuss the RSA cryptosystem.
12 p vlute 16/11/2015 334 1
Từ khóa: Symmetric-Key Cryptography, Knapsack cryptosystem, Analyze DES, RSA cryptosystem, An toàn thông tin, Bảo mật thông tin
Chapter 7: Advanced Encryption Standard (AES)
Objectives of Chapter 7: To review a short history of AES; to define the basic structure of AES; to define the transformations used by AES; to define the key expansion process; to discuss different implementations.
11 p vlute 16/11/2015 315 1
Từ khóa: Encryption Standard, Basic structure of AES, Analyze DES, Transposition ciphers, An toàn thông tin, Bảo mật thông tin
Chapter 14: Entity Authentication
Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.
7 p vlute 16/11/2015 465 1
Từ khóa: Entity Authentication, Elliptic Curves, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Bảo mật thông tin
Chapter 12: Cryptographic Hash Functions
Objectives of Chapter 12: To introduce general ideas behind cryptographic hash functions; to discuss the Merkle-Damgard scheme as the basis for iterated hash functions; to distinguish between two categories of hash functions; to discuss the structure of SHA-512; to discuss the structure of Whirlpool.
8 p vlute 16/11/2015 378 1
Từ khóa: Cryptographic Hash Functions, Elliptic Curves, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Bảo mật thông tin