亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? index

?? 應用密碼學密碼算法源代碼 應用密碼學密碼算法源代碼
??
?? 第 1 頁 / 共 4 頁
字號:
Newsgroups: sci.crypt,comp.security.misc,alt.securitySubject: APPLIED CRYPTOGRAPHY - Electronic Version of IndexMessage-ID: <CGoB9q.Cyx@chinet.chinet.com>From: schneier@chinet.chinet.com (Bruce Schneier)Date: Thu, 18 Nov 1993 05:58:37 GMTOrganization: Chinet - Public Access UNIXLines: 1747Attached is the index to my book, Applied Cryptography.  Please feel free todistribute it at will in electronic form.  Permission is not given to printthe index out; for that you have to buy the book.  I would appreciate it ifthis index were placed on various crypto ftp sites around the world.Bruce******************************************************************************APPLIED CRYPTOGRAPHY INDEXcopyright 1994 by John Wiley & Sons.  Permission is granted only to copy anddistribute this index electronically.Abreast Davies-Meyer hash function, 343Accreditation, single, 292Active attacks, 25Active cheaters, 25Adaptive-chosen-plaintext attack, 5ADFGVX cipher, 10Adjudicator, 23, 24Adleman, Leonard, 12, 282Advanced threshold schemes, 385, 86Adversaries, 4Agnew, G. B., 370Algebraic coding theory, 316Algorithms       and ciphers, 2, 3       breakable, 7       choosing, 183, 85, 272, 320       complexity of, 194, 95       for export, 184, 85, 448, 54       introduction, 2, 3       multiple and multiple encryption, 168       public, 183, 84       restricted, 2       secure, 7       security of symmetric cryptosystem and, 129, 30       strong, 7       types of, mathematically defined, 194       unconditionally secure, 7All or nothing disclosure of secrets (ANDOS)       introduction, 83, 84       multiple parties buying from single seller, 399, 401       voting with single central facility, 109Alternating stop-and-go generator, 360, 61American Bankers Association, 221American National Standards Institute (ANSI).  See ANSI.Anderson, Ross, 360Anonymous key distribution, 80, 81Anonymous messages       broadcasting, 124, 26       Dining Cryptographers problem, 124       multiparty unconditionally secure protocols, 126Anonymous money orders, 117, 19ANSI standards, DES, 221, 22ANSI X9.17 key generation, 145Arbitrated       protocols, 21, 23       solutions, 62, 63       timestamping services, 62Arbitrators       computer, 23       difference between adjudicators and, 24       group signatures with trusted, 70, 71       role of, 21, 23       signing documents with symmetric cryptosystems and, 31, 33       simultaneous contract signing with, 99       simultaneous contract signing without, (face-to-face), 99, 100       simultaneous contract signing without, (not face-to-face), 100, 1       simultaneous contract signing without, (using cryptography),101, 3Ascom-Tech AG, 266Asmuth-Bloom, 385Athena project, 417, 425AT&T, 370Attacks.  See also Authentication; Cryptanalysis       active, 25       against DES, 234, 238, 39       against poker protocols, 80       against proof-of-identity protocols, 49       against protocols, 24, 25       against public-key cryptography, 30, 31, 274       attackers, 4       birthday attack, 295, 322       block replay, 155, 57       brute-force, 130, 35       chosen-ciphertext attack, 274, 75, 286, 87       common modulus attack against RSA, 287       Den Boer and Bosselaer's attacks, 329, 333, 336, 337       dictionary, 142, 44       dictionary, and salt, 47, 48       digital signatures and encryption, 38       foiling resend, 39       insertion attack, stream ciphers, 174       introduction, 4       low exponent attack against RSA, 287, 88       man-in-the-middle attack, 43, 44, 50       meet-in-the-middle attack, 166       passive, 25       reduced keyspaces and, 141, 42       software-only brute-force, 135, 36       time and cost estimates for brute-force attack, 130, 35, 195       types of, 5, 6       viruses, 137Authentication       dictionary attacks and salt, 47, 48       Feige-Fiat-Shamir algorithm, 291, 96       introduction, 47       key exchange and, 51, 56       mutual, using interlock protocol, 49, 51       Schnorr algorithm, 303       SKID, 51       user identification with public-key cryptography, 48, 49Authenticators, 419Avalanche effect, 227, 245Backup keys, 149Banks and digital cash, 117, 24Bardell, Paul, 363Battisa, Leon, 10Beaufort cipher, 10Bellcore, 306Bell Laboratories, 237Bell-Northern Research, 415Bellovin, Steve, 50, 378, 380, 424Bennett, Charles, 408, 410Ben-Or, Michael, 100Berkovitz, Shimshon, 382Berson, Tom, 333Beth-Piper stop-and-go generators, 359, 60Beth, Thomas, 301Biases and correlations, generated sequences, 371, 72Biham, E., 234, 237, 238, 240, 244, 247, 249, 252, 253, 259, 260,       264, 268, 272, 324, 326, 329Bilateral stop-and-go generator, 361Biotechnology and brute-force attacks, 138, 39Birthday attacks, 322, 23       Fiat-Shamir signature scheme, 294, 96Bishop, Matthew, 429Bit commitment, 71, 74       blobs, 74       using one-way functions, 73       using pseudo-random sequence generators, 73, 74       using symmetric cryptography, 72Blakley, G. R., 60, 384Blind signatures       algorithm, 403, 4       completely, 94, 95       cut-and-choose technique, 95, 96       envelopes, 96       introduction, 93, 94       voting with, 106, 7Blobs, bit commitment, 74Block algorithms.  See Algorithms, blockBlock chaining (BC) mode, 163Block cipher MAC, 345Block cipher modes       block chaining (BC) mode, 163       block replay, 155, 57       choosing, 164, 65       cipher block chaining (CBC) mode, 157, 60, 231       cipher block chaining of plaintext difference (CBCPD), 164       cipher feedback (CFB) mode, 160, 61, 231       counter mode, 163       Electronic Codebook mode (ECB), 154, 55, 231       error propagation, 159, 60, 161, 162       framing, 160       Initialization vector, 48, 158, 161, 162       output feedback (OFB) mode, 162, 231       output feedback with a non-linear function (OFBNLF), 164       padding, 158, 59       plaintext block chaining (PCB) mode, 164       plaintext feedback (PFB) mode, 164       propagating cipher block chaining (PCBC) mode, 163, 64       self-recovering errors, 160Block ciphers       CA-1.1, 268, 69       DES as,  224       DES, overview and outline, 224       FEAL-N, 249, 52       IDEA, 260, 266, 436         introduction, 3       Khufu and Khafre, 257, 59       LOKI, 255, 57       Lucifer, 220, 236, 244, 45       Madryga, 245, 47       MMB, 266, 68       NewDES, 247, 49       RC2 and RC4, 259, 60       REDOC, 252, 55       Skipjack, 269, 70, 437       stereotyped beginnings and endings, 155       using as stream ciphers, 175, 76       vs. stream ciphers, 176, 77Blocks       introduction, 3       length, doubling via multiple encryption, 167, 69       replay, 155, 57       size for computer analysis, 3Bloom, J., 385Blum integers, 208, 397, 98Blum, Manuel, 75, 87, 91, 407Blum-Mitcali generator, 365BlumBlumShub (BBS) generator, 365, 66, 407Boolean circuit, 117Bosselaers, A., 329, 333Boyar, Joan, 349Boyd, Colin, 56Branstead, Dennis, 223Brassard, Giles, 74, 408, 410Breakable algorithms and work factor, 7Brickell, Ernie, 304, 315British Telecom, 410Broadcast interactive proofs, 91Broadcasting       keys and messages, 46, 47, 57       anonymous messages, 124, 26       secrets, 381, 83Brute-force attack, 130, 35, 195       biotechnology, 138, 39       Chinese Lottery, 137       software crackers, 135, 36       software only, 135, 36       time and cost estimates for brute-force attacks, 130, 35, 195       viruses, 137Burmester, Mike, 91CA-1.1, 268, 69Cade algorithm, 318Cash, Digital.  See Digital CashCCITT X.508 public-key protocol, 153CD-ROM applications, 15Cellular automata (CA), 268, 317, 337Cellular automaton generator, 363Central Legitimization Agency (CLA), 107Central Tabulating Facility (CTF), 105Certificates, 153, 426, 430Certification Authorities (CAs), 426, 430Certifying authority (CA), 153, 426Chaining variables, 330Chaining, 157, 60Chambers, W. G., 362Chaum, David, 68, 70, 114, 392, 393, 403, 404Cheaters       passive and active, 25       secret sharing with, 60, 386, 87Cheating       secure elections, 113, 14       with digital cash, 117, 24       with digital signatures, 36, 37Chess grandmaster problem, 91, 93Chinese Lottery, 137, 38Chinese remainder theorem, 204, 5Chips       and random noise, 370       Clipper and Capstone, 181, 269, 436, 437, 38       DES chip, 231       RSA, 281, 288Chor-Rivest knapsack, 280, 81Chosen-ciphertext attack, 5, 6, 274, 75, 286, 87Chosen-plaintext attack, 5, 274Cipher block chaining (CBC) mode, 157, 60       DES, 231       error propagation, 159, 60       initialization vector, 158       padding, 158, 59Cipher block chaining of plaintext difference (CBCPD), 164Cipher feedback (CFB) mode, 160, 61       DES, 231       error propagation, 161       self-synchronous stream ciphers, 174, 75Cipherpunks, 445Ciphers       and algorithms, 2, 3       blocks.  See Block ciphers       historic term, 8       stream.  See Stream ciphers       substitution, 8, 10, 193       transposition, 10Ciphertext, 1, 2Ciphertext pairs, 238Ciphertext-only attack, 5Civil War, American, 10Cleartext, 1-2Clock pulse, 351Clocks, computer for real random sequence generators, 369, 70Codes.  See also Cryptanalysis       historic term, 8       PURPLE, Japanese diplomatic, 6       q-code cryptosystems, 8Coefficients, solving for, 203Coin flipping       Dining Cryptographers problem, 124, 26       fair coin flips, 74, 78, 395, 98       into well, 77       key generation using, 78       using Blum integers, 397, 98       using exponentiation modulo p, 396, 97       using one-way functions, 75, 76       using public-key cryptography, 76, 77       using square roots, 396Commercial COMSEC Endorsement Program (CCEP), 223Common modulus attack on RSA, 287Communications       ANSI standards, 221, 22       protocols, purpose of, 20, 21       using public-key cryptography, 29, 31       using symmetric cryptography, 26, 27Communications networks, encrypting, 178, 80       end-to-end encryption, 179, 80       link-by-link encryption, 178, 79, 180       traffic-flow security, 178Company, example, 21Complement keys, 234Complexity classes of problems, 196, 97Complexity theory, 193, 98       algorithms, 194, 95, 319       computational complexity, 193       NP, complete problems, 197, 98, 277       problems, 195, 97       stream ciphers, 365, 66Compression permutation, 227Compromised keys, 150Computational complexity, 193Computer analysis       adjudicated protocols, 24       arbitrators, 23       block size for, 3       processors for brute-force attack, 131, 34       pseudo-random sequence generation, 15, 39, 41       software-only brute force attacks, 135, 36       XOR algorithm, 12, 13Computer communications.  See CommunicationsComputer Professionals for Social Responsibility (CPSR), 438,446, 47Computer Security Act of 1987, 221, 304, 441Computing with encrypted data, 71, 395Computationally secure algorithm, 7COMSET (COMmunications SETup), 377, 78Confirmation messages, 37, 38Confusion, 193Connell, Charles, 249Continued Fraction Algorithm, 211Contract signing.  See Signing contracts, simultaneouslyContraction functions, 28Convertible undeniable signatures, 393, 95Cook, S. A., 197Coppersmith, Don, 80, 240, 341Cost estimates for brute-force attack, 130, 35, 195Counter mode, 163, 172, 173Crime and digital cash, 123crypt(1), 364CRYPT(3), 242Crypt Breakers Workbench (CBW), 364Cryptanalysis       differential, 237, 238, 40       introduction, 1, 4, 7       linear, 241       of FEAL, 251, 52       of IDEA, 264       of LOKI, 255, 56       of Madryga, 247       of N-Hash, 326, 28       of NewDES, 248, 49       related-key, 240, 41       Snefru one-way hash function, 324, 25Cryptanalysts, 1Cryptech, Inc., 255CRYPTO conference, 91Cryptographers, 1Cryptographic facility, 414Cryptographic protection of databases, 61Cryptographic protocols, 20Cryptographically secure pseudo-random sequence generators (CSPRSGs), 356Cryptography       definition, 1       hybrid systems, 177       implementations.  See Example implementations       large numbers used in, 15, 16       quantum, 408, 10       relativized, 192       simultaneous contract signing without arbitrator, 101, 3Cryptologists, 1Cryptology, 1Cryptosystems       introduction, 4              security, 7, 191Cubic algorithms, 194Cusick, Thomas, 253Cut and choose technique, 85, 86       blind signatures and, 95, 96Damgard, Ivan, 337Damm, Arvid Gerhard, 11Data authentication code (DAC), 28Data Encryption Standard (DES)       adoption of, 221, 22       algorithm, overview and outline, 224       alternate S-boxes, 242       attacks against, 234, 238, 39       avalanche criteria, 227       complement keys, 234       compression permutation, 227       CRYPT(3), 242       decrypting, 230       development of, 219, 21       differential cryptanalysis, 237, 238, 40       E-boxes, 227       encryption speed, 231       expansion permutation, 227, 28       final permutation, 230       FIPS PUBs, 221       generalized (GDES), 243       hardware and software implementations of, 231       in 1987, 222, 23       in 1992, 223, 24       initial permutation, 26       key length, 236, 37       key transformation, 226, 27       linear cryptanalysis, 241       modes of, 231       multiple, 241       non-group benefits, 234, 45       P-box permutation, 230       permuted choice, 227       related-key cryptanalysis, 240, 41       rounds, 224, 237       S-boxes, 228, 29, 237, 38       security, 232       speed, compared to RSA, 286       straight permutation, 230

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕不卡在线播放| 91精品国产乱码| 中文字幕亚洲视频| www.亚洲国产| 伊人开心综合网| 欧美亚洲国产一区在线观看网站| 亚洲一区二区av在线| 欧美一区二区三区系列电影| 麻豆精品视频在线观看| 久久久久久久一区| 波多野结衣91| 亚洲韩国精品一区| 欧美成人伊人久久综合网| 国产高清精品网站| 一区二区三区加勒比av| 欧美一卡二卡三卡| 国产精品一品二品| 狠狠色狠狠色综合系列| 久久免费国产精品 | 香蕉久久夜色精品国产使用方法 | 国产露脸91国语对白| 国产农村妇女精品| 色吊一区二区三区| 免费成人你懂的| 中文字幕一区视频| 日韩一区二区三区三四区视频在线观看 | 日韩中文字幕av电影| 久久婷婷国产综合精品青草| 99视频有精品| 美女久久久精品| 综合av第一页| 精品1区2区在线观看| 91丨九色丨国产丨porny| 秋霞国产午夜精品免费视频| 国产精品久久久久久久午夜片| 欧美在线免费视屏| 成人免费毛片片v| 美女性感视频久久| 一区二区国产盗摄色噜噜| 欧美精品一区二区高清在线观看| 91免费在线视频观看| 久热成人在线视频| 亚洲最大的成人av| 国产精品伦一区二区三级视频| 91精品国产高清一区二区三区 | 色国产综合视频| 国产在线视频一区二区| 亚洲成人综合在线| 成人免费在线观看入口| 精品福利一二区| 欧美日本韩国一区| 91碰在线视频| 成人一道本在线| 精品系列免费在线观看| 亚洲第一主播视频| 亚洲精品高清视频在线观看| 日本一区二区视频在线| 欧美成人乱码一区二区三区| 欧美日韩激情一区二区三区| 日本福利一区二区| 9久草视频在线视频精品| 国产精品88888| 狠狠色丁香婷综合久久| 美国一区二区三区在线播放| 成人精品免费看| 国产米奇在线777精品观看| 日韩精品一区第一页| 亚洲综合一二区| 亚洲码国产岛国毛片在线| 中文字幕亚洲欧美在线不卡| 国产精品久久影院| 国产精品色哟哟网站| 欧美激情一区二区三区不卡| 国产人伦精品一区二区| 国产拍欧美日韩视频二区| 国产欧美一区二区精品婷婷| 国产亚洲女人久久久久毛片| 久久久av毛片精品| 日本一区二区三区在线不卡| 国产亚洲欧美在线| 国产精品理伦片| 亚洲色图在线视频| 一区二区成人在线视频| 亚洲国产日韩一区二区| 亚洲成人精品一区二区| 日韩精品色哟哟| 蜜桃av一区二区在线观看 | 国产91精品欧美| 国产精品一区二区久久精品爱涩| 国产精品一区二区视频| av在线不卡观看免费观看| 日本道色综合久久| 欧美日本乱大交xxxxx| 日韩一区二区三区三四区视频在线观看 | 国产人妖乱国产精品人妖| 久久久午夜精品| 国产女同性恋一区二区| 亚洲人成在线观看一区二区| 亚洲国产精品久久久久婷婷884 | 精品国产亚洲在线| 国产欧美日韩激情| 国产精品自拍毛片| 国产乱码精品1区2区3区| av电影天堂一区二区在线观看| 色婷婷av一区二区三区软件 | 久久久影视传媒| 亚洲国产成人午夜在线一区| 亚洲免费观看高清完整版在线观看| 亚洲成人动漫精品| 久久99精品国产麻豆婷婷| 成人高清免费观看| 制服丝袜国产精品| 国产精品三级电影| 丝袜国产日韩另类美女| 国产精品一区二区三区四区| 欧美综合久久久| 26uuu精品一区二区三区四区在线 26uuu精品一区二区在线观看 | 日韩亚洲欧美一区二区三区| 久久色.com| 亚洲综合视频网| 国产一区二区三区在线观看精品| 一本大道久久a久久综合| 日韩一区二区免费电影| 亚洲色图另类专区| 国产一区日韩二区欧美三区| 日本高清不卡视频| 国产欧美精品一区| 秋霞影院一区二区| 91久久精品一区二区三区| 久久人人超碰精品| 三级不卡在线观看| 欧美精品一区二区在线观看| 亚洲欧美日韩成人高清在线一区| 麻豆成人av在线| 欧美在线观看视频一区二区三区| 久久精品男人的天堂| 首页综合国产亚洲丝袜| 91免费在线视频观看| 国产区在线观看成人精品| 日韩成人精品在线观看| 欧美性大战久久| 亚洲欧美日本在线| 成人免费的视频| 久久精品人人做人人综合 | 欧美色涩在线第一页| 亚洲国产精品黑人久久久| 麻豆精品视频在线观看免费| 欧美乱妇一区二区三区不卡视频| 亚洲欧美日韩在线不卡| 成人精品国产福利| 久久久99久久| 国产一区 二区| 337p粉嫩大胆色噜噜噜噜亚洲| 日韩精品色哟哟| 欧美猛男gaygay网站| 一区二区三区四区不卡在线| 99精品国产热久久91蜜凸| 国产欧美日韩综合精品一区二区| 国精产品一区一区三区mba桃花| 91精品视频网| 日韩在线一区二区三区| 777亚洲妇女| 午夜精品一区二区三区免费视频| 欧美最猛性xxxxx直播| 亚洲精品成人精品456| 91免费看片在线观看| 日韩毛片在线免费观看| 色欧美88888久久久久久影院| 综合电影一区二区三区| 色综合色狠狠天天综合色| 一区二区在线观看免费视频播放| 99久久综合狠狠综合久久| 中文字幕精品一区二区精品绿巨人 | 中文字幕av在线一区二区三区| 国产精品一色哟哟哟| 中文av一区二区| 91亚洲国产成人精品一区二区三| 亚洲精品中文字幕乱码三区| 91电影在线观看| 天天色综合成人网| 欧美一级夜夜爽| 国产精品一区二区久久精品爱涩| 欧美国产一区视频在线观看| 99麻豆久久久国产精品免费| 国产麻豆成人精品| 国产精品丝袜一区| 色综合久久88色综合天天免费| 亚洲一区av在线| 日韩三级在线免费观看| 国产精品一区二区在线观看网站| 国产精品麻豆视频| 欧美日韩色一区| 国产成人综合网| 一区二区三区在线观看国产| 欧美久久久一区| 高清beeg欧美| 亚洲第一综合色| 国产欧美一区视频| 欧美视频一区二区三区四区| 久久av中文字幕片|