- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Chapter 10: Elliptic Curve Cryptography
This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.
14 p vlute 16/11/2015 461 1
Từ khóa: Elliptic Curve Cryptography, Elliptic Curves, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Bảo mật thông tin
Chapter 3: Traditional Symmetric-Key Ciphers
Objectives of Chapter 3: To define the terms and the concepts of symmetric key ciphers; to emphasize the two categories of traditional ciphers: substitution and transposition ciphers; to describe the categories of cryptanalysis used to break the symmetric ciphers.
12 p vlute 16/11/2015 344 1
Từ khóa: Symmetric-Key Ciphers, Symmetric ciphers, Elliptic Curve Cryptosystems, Transposition ciphers, An toàn thông tin, Bảo mật thông tin
Objectives of Chapter 13: To define a digital signature; to define security services provided by a digital signature; to define attacks on digital signatures; to discuss some digital signature schemes, including RSA, ElGamal, Schnorr, DSS, and elliptic curve; to describe some applications of digital signatures.
8 p vlute 16/11/2015 399 1
Từ khóa: Digital Signature, Security services, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Chữ ký số
Chapter 14: Entity Authentication
Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.
7 p vlute 16/11/2015 465 1
Từ khóa: Entity Authentication, Elliptic Curves, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Bảo mật thông tin
Chapter 12: Cryptographic Hash Functions
Objectives of Chapter 12: To introduce general ideas behind cryptographic hash functions; to discuss the Merkle-Damgard scheme as the basis for iterated hash functions; to distinguish between two categories of hash functions; to discuss the structure of SHA-512; to discuss the structure of Whirlpool.
8 p vlute 16/11/2015 378 1
Từ khóa: Cryptographic Hash Functions, Elliptic Curves, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Bảo mật thông tin
Objectives of Chapter 15: To explain the need for a key-distribution center; to show how a KDC can create a session key; to show how two parties can use a symmetric-key agreement protocol to create a session key; to describe Kerberos as a KDC and an authentication protocol; to explain the need for certification authorities for public keys; to introduce the idea of a Public-Key Infrastructure (PKI) and explain some of its duties.
7 p vlute 16/11/2015 439 1
Từ khóa: Key Management, Elliptic Curves, Elliptic Curve Cryptosystems, Implementation of ECC, An toàn thông tin, Bảo mật thông tin