亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? index

?? 應用密碼學密碼算法源代碼 應用密碼學密碼算法源代碼
??
?? 第 1 頁 / 共 4 頁
字號:
       generating using coin flipping, 78       generating, 140, 45       Interchange Key (IK), 433       introduction, 2, 3       key crunching, 144       key-encryption key, 146       keystream generator and, 170, 71       lifetime of, 150, 51       master and master terminal, 413       master key, 146       pass phrase and, 145       poor choices for, 142, 44       reduced keyspaces, 141, 42       ROM, 148, 49       semi-weak keys, 233       session, 42       software and hardware implementations, 148       storing, 148, 49       symmetric cryptosystems, 26, 27       transferring, 145, 47       transmitting messages and, 46       verifying, 147, 48       weak DES, 232, 34Keyspace, 2Keystream generator, 169, 72Khufu and Khafre, 257, 59Kilian, Joe, 74, 97Klein, Daniel, 48Knapsack algorithm, 277, 81       creating public key from private, 278, 79       decryption, 279, 80       encryption, 279       one-way hash functions, 337       patents, 281       practical implementations, 280       security, 280       superincreasing, 278       variants, 280, 81Known-plaintext attack, 5Knudson, Lars, 255, 256Knuth, D., 201, 203, 211Koblitz, Neal, 275, 317Konheim, Alan, 237Korzhik, V. I., 316Kranakis, Evengelos, 200KryptoKnight, 425Kurosawa, T., 318L'Ecuyer, Pierre, 349LaGrange interpolating polynomial scheme, 383, 84Lai, Xuejia, 260, 264, 266, 340, 341, 343, 345LaMacchia, Brian, 307, 381Language, rate and redundancy of, 190, 91Large numbers used in cryptography, 15, 16Lawsuits and patents, 447, 48Legendre symbol, 206Lehmann prime number algorithm, 215Length, maximal, of LSFRs, 351Lenstra, Arjen, 212, 306, 309Lexar Corporation, 237Lidl, Rudolph, 318Lifetime of keys, 150, 51Linear algorithms, 194linear congruential generators, 347, 51Linear cryptanalysis, 241Linear feedback shift registers (LFSR), 351, 55Linear sieve, 217Link-by-link encryption, 178, 79, 180Linking protocols, 63, 64Logarithms, discrete       in finite field, 216, 18       problem, 153, 317, 395       zero knowledge proofs, 401, 3LOKI, 255, 57LOKI double-block hash function, 342LOKI single-block hash function, 339Low exponent attack against RSA, 287, 88LSFR.  See Linear feedback shift registersLu-Lee cryptosystem, 280Luby-Rackoff method, 270, 71LUCIFER, 220, 236, 244, 45MAC (Message Authentication Code), 345Macintosh system 7, 148Madryga, 245, 47Mail systems       digital certified mail, 103, 4       MITRENET, 414, 15       privacy-enhanced mail (PEM), 428, 36Man-in-the-middle attack, 43, 44, 49, 50Manasse, 212Manipulation detection code (MDC), 28MASKs, 253Massey, James, 260, 340, 343, 364, 367, 439Master key, 146, 413Master terminal key, 413Mathematical theory.  See Information theoryMatsui, Mitsuru, 241, 252Matsumoto-Imai algorithm, 318Matyas, S. M., 413Maximal length generator, 347Mauborgne, Major Joseph, 13Maurer, Ueli, 367McCurley, Kevin, 275, 304McEliece algorithm, 316MD2, 333MD4, 329MD5, 329, 33       chaining variables, 330       description of, 329, 32       security, 332, 33MDC-4, 343, 44Mechanical encryption devices, 11Meet-in-the-middle attack, 166Memory management, 152, 183Mental poker       anonymous key distribution, 80, 81       attacks against poker protocols, 80       introduction, 78       with three players, 78, 79Merchants, cheating, 119, 22Merkle, Ralph, 166, 167, 257, 59, 273, 277, 324, 329, 344Merkle-Hellman knapsack algorithm, 277, 81Merritt, Michael, 110, 378, 380, 424Message Authentication code (MAC), 345Message Digest, 28, 329Message digest cipher (MDC), 271, 72Message Integrity Check (MIC), 429Message security protocol (MSP), 436Messages       broadcasting keys and, 46, 47, 57       information theory, 189, 93       introduction, 1, 2Metal insulator semiconductor capacitor (MISC), 370Meyer, C. H. W., 232, 338, 413Meyer, Joseph A., 453Meyer-Schilling hash function, 344Micali, Silvio, 80, 82, 100, 295, 386, 398, 406, 407Miller, V. S., 275, 317Minimum, disclosure proof, 84MITRENET, 414, 15Miyaguchi hash function, 339, 40Miyaguchi, Shoji, 249MMB (Modular Multiplication-based Block cipher), 266, 68(m,n)-threshold scheme, 59, 383Modular arithmetic, 198, 200       greatest common divisor, 200, 1       inverses in modular arithmetic, 201, 3       prime numbers, 200Modular reduction, 198Moore, J. H., 288Motorola, 306, 7Muller, Winfried, 318Multiple DES, 241Multiple encryption, 165, 69       double encryption, 165, 66       doubling block length via, 167, 69       encrypt-decrypt-encrypt (EDE) mode, 166, 67       meet-in-the-middle attack, 166       multiple algorithms for, 168       triple encryption, 166, 67       with multiple algorithms, 168Multiple keys, public-key cryptography, 56, 58, 381Multiple signatures, 36, 296, 298, 99Multiplexer generator, 359Multiplier, 347Multispeed inner-product generator, 363Mutual authentication, 49, 51N-Hash one-way hash function, 326, 28N-party identification, 296National Bureau of Standards (NBS), 219, 21National Computer Security Center (NCSC), 440, 41National Institute of Standards and Technology (NIST), 218, 304,441, 44National Security Agency, 130, 184, 85, 439, 40       and DES,  219, 23, 232, 236, 37, 273, 74       and DSS, 312, 13       Skipjack, 269, 70, 437Needham, 52, 177Needham and Schroeder protocol, 52, 54Networks       factoring algorithms on, 212, 13       IBM secret-key management protocol, 413, 14       key distribution in, 147Neumann, John von, 39NewDES, 247, 49New South Wales, University of, 256Niederreiter cryptosystem, 280Niederreiter, Harald, 318Niemi cryptosystem, 280Nippon Telephone and Telegraph, 326Nobauer, Wilfried, 318Noninteractive zero-knowledge proofs, 90, 91NP problems, 196, 98NP-complete problems, 197, 98, 277NTT Japan, 249, 252, 314Number Field Sieve, (NFS), 211, 217Number Theory, 198, 211       Blum integers, 208       Chinese remainder theorem, 204, 5       Euler totient function, 203, 4       Fermat's little theorem, 203       Galois field, computing in, 209, 10, 276       generators, 208, 9       GF(2^n), computing in, 210, 11, 276       Jacobi symbol, 207, 8, 290       Legendre symbol, 206       modular arithmetic, 198, 200       Primative polynomials mod 2, 353, 56       quadratic residues and nonresidues, 206       solving for coefficients, 203Numbers, relatively prime, 200Numbers and nonuniform distributions, 372, 74Nurmi, Hannu, 109Oblivious transfer       algorithm, 404       fair cryptosystems, 82, 83       introduction, 97, 98Octway-Rees protocol, 54Odlyzko, Andrew, 307, 381Office of Technology Assessment, 223Ohta, Kazuo, 123, 319Ohta-Okamoto identification scheme, 296Okamoto 92 algorithm, 316, 17Okamoto, Tatsuaki, 123, 314, 319Omaa, Arto, 109One-key algorithms, 3One-time pads       overview, 13, 16       security of, 7One-time tape, 366One-way functions       abreast Davies-Meyer, 343       bit commitment using 73       coin flipping using, 75, 76       Davies-Meyer, 338, 39, 340, 41       equal block and key sizes, 340       LOKI double-block, 342       LOKI single-block, 339       MDC-4, 343, 44       Miyaguchi, 339, 40       Preneel-Bosselaers-Govaerts-Vandewalle, 341       prime numbers and , 213       public-key cryptography, 27, 28       Quisquater-Girault, 341, 42       tandem Davies-Meyer, 342, 43       trap-door, 28       using block Algorithms as one-way hash functions, 338, 44One-way hash functions, 28, 29, 270, 72       background, 321, 24       birthday attack, 322       choosing best, 345       design overview, 323, 24       diffusing randomness, 372       HAVAL, 336, 37       Karn, 270       key-dependent, 345, 46       length of, 323       Luby-Rackoff, 270, 71       MAC, 345       MD2, 333       MD4, 329       MD5, 329, 33       Message Digest, 329       message digest cipher (MDC), 271, 72       N-Hash, 326, 28       RIPE-MD, 336       Secure Hash Algorithm (SHA), 308, 333, 36       Snefru, 324, 25       using public-key algorithms, 344       using symmetric block algorithms, 338, 44Ong-Schnorr-Shamir algorithm, 299, 300, 387, 88Open Computing Security Group, 425Opponents, 4Orange Book, 440Outerbridge, Richard, 167Output feedback (OFB) mode, 162       DES, 231       error propagation, 162       security problems, 162       stream ciphers, 172, 73Output feedback with a non-linear function (OFBNLF), 164P problems, 196Padding, 158, 59       triple encryption with, 167Painvin, Georges, 10Parallel zero-knowledge proofs, 89Pass phrase, 145Passive attacks, 25Passive cheaters, 25Passwords, authentication, 47, 51Patents, 447, 48       CA-1.1, 268, 69       Diffie-Hellman, 276       Digital Signature Algorithm (DSA), 313, 14       ElGamal, 302       ESIGN, 315       FEAL, 252       Fiat-Shamir signature scheme, 296       IDEA, 266       knapsacks, 281       LOKI, 256       Lucifer, 245       Pohlig-Hellman algorithm, 289       REDOC, 254, 55       RSA algorithm, 288       Schnorr algorithm, 304Pederson, Torben, 395PEM public-key protocol, 153Perfect secrecy, 191Period of cypher, 10Periodic keystream generators, 171, 72Permutations       DES, 227, 30       generating random, 374, 75Permuted choice, 227PES (Proposed Encryption Standard), 260Pfitzmann, Brigit, 69Pfleeger, Charles, 80Pieprzyk, Josef, 336Pieprzyk cryptosystem, 280PINs, 221, 381Plaintext       introduction, 1, 2       pairs, characteristics of, 238Plaintext block chaining (PCB) mode, 164Plaintext feedback (PFB) mode, 164Playfair cipher, 10Pless generator, 359Pohlig, S. C., 217Pohlig-Hellman algorithm, 289Poker.  See Mental pokerPolicy Certification Authorities (PCAs), 430Pollard, J. M., 300Pollard's Monte Carlo Algorithm, 211Polyalphabetic substitution cyphers, 9, 10Polygram substitution cipher, 9, 10Polynomial time algorithms, 194Pomerance, Carl, 212Price, W. L., 414Preliminary Message Security Protocol (PMSP), 436Preneel, Bart, 323, 340, 341, 345Preneel-Bosselaers-Govaerts-Vandewalle hash function, 341Pretty Good Privacy (PGP), 153, 436, 37Prevention, secret sharing with, 387Primative polynomials mod 2, 353, 56Prime numbers, 200, 213, 16       Lehmann prime number algorithm, 215       Rabin-Miller, 214, 15       Solvay-Strassen, 214       strong primes, 215, 16Primitives, 208Principle square root, 208Privacy-enhanced mail (PEM), 428, 36       certificates, 430       messages, 430, 34       PEM documents, 429       RIPEM, 435, 36       security, 434       TIS-PEM, 434, 35Private keys       compromised, 150       creating public from, knapsack algorithm, 278, 79       fair cryptosystems, 82, 386, 398, 99       introduction, 4       lifetime of, 151Private keys.  See Secret keysProbabilistic encryption, 406, 8Problems       complexity classes, 196, 97       complexity of, 195, 97       discrete logarithm, 317, 395       hard, 196, 319       mathematical classes of, 196, 98       tractable and intractable, 195, 96       undecidable, 196Proof-of-identity protocols, 49, 301Proofs       broadcast interactive proofs, 91       minimum-disclosure proof, 84       Zero-knowledge, 84, 91Propagating cipher block chaining (PCBC) mode, 163, 64, 418Protocols       adjudicated, 23, 24       arbitrated, 21, 23       attacks against, 24, 25       basic zero-knowledge, 85, 87       cryptographic, 20       distributed protocols, 64, 65       example company, 21       interactive, 86       interlock, 44, 45, 49, 51       introduction to, 19, 25       ISO authentication framework, 425, 28       Kerberos protocol, 55       linking protocols, 63, 64       Needham and Schroeder protocol, 52, 54       Otway-Rees protocol, 54       proof-of-identity, 49       purpose of, 20, 21       secret-key identification (SKID), 50, 51       self-enforcing, 24       simplistic voting, 105, 6       SPX protocols, 55, 56       steps involved in, 20       Wide-Mouth Frog protocol, 51, 52       Yahalom protocol, 52Pseudo-random.  See also Random numbers       key crunching, 144       sequence generation, 15, 39, 41       sequence generators, bit commitment using, 73, 74       unpredictable numbers, 41Pseudo-random sequence generators.  See also Real random sequence generators       combining linear congruential generators, 349, 51       linear congruential generators, 347, 51       linear feedback shift registers (LFSR), 351, 55       modified LFSRs, 356       Shamir's pseudo-random number generator, 365PSPACE-complete problems, 197Public algorithms, 183, 84Public-Key algorithms       as hash functions, 344       attacks against, 274, 75       Cade, 318       cellular automata, 317       choosing, 320       compared to symmetric, 31       Diffie-Hellman, 275, 77       Digital Signature Algorithm (DSA), 304, 14       ElGamal, 300, 2       elliptic curve cryptosystems, 317, 318       ESIGN, 314, 15       fair, 83, 386, 398, 99       Feige-Fiat-Shamir, 291, 96       Guillou-Quisquater, 297, 99       hard problems, 319       introduction, 3, 4, 273, 74       Knapsack algorithms, 277, 81

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区三区在线免费视频| 国产精品小仙女| 欧洲精品视频在线观看| 日韩理论电影院| 丁香激情综合五月| 国产精品电影院| 经典一区二区三区| 日韩三级中文字幕| 五月综合激情网| 99国产精品久久久久久久久久| 欧美激情在线观看视频免费| 大白屁股一区二区视频| 国产精品天干天干在线综合| 天堂在线一区二区| 欧美成人a∨高清免费观看| 日韩不卡免费视频| 精品伦理精品一区| 国产成a人亚洲精| 中文字幕第一页久久| 97aⅴ精品视频一二三区| 一区二区免费在线| 欧美日韩高清在线播放| 琪琪一区二区三区| 欧美一区二区三区四区五区| 久久99在线观看| 久久综合久久99| 成人激情小说网站| 一区二区三区不卡视频在线观看| 欧美日韩精品欧美日韩精品一综合| 丝袜亚洲精品中文字幕一区| 日韩免费电影一区| 99视频超级精品| 亚洲欧美日韩国产成人精品影院| 欧美午夜寂寞影院| 久久电影网站中文字幕 | 成人av资源在线| 亚洲美腿欧美偷拍| 6080亚洲精品一区二区| 国产精品一区二区在线看| 亚洲天堂成人网| 日韩三级精品电影久久久 | 欧美激情综合网| 92精品国产成人观看免费| 五月婷婷另类国产| 国产午夜精品一区二区三区嫩草 | 欧美人xxxx| 国产真实乱子伦精品视频| 中文字幕在线观看一区二区| 欧美丰满少妇xxxxx高潮对白| 不卡一区在线观看| 一区二区三区在线观看视频| 欧美成人a视频| 欧美性感一区二区三区| 国产一区二区在线观看免费| 亚洲乱码国产乱码精品精小说| 日韩欧美一区二区不卡| 91小视频免费看| 紧缚奴在线一区二区三区| 日本一二三不卡| 91精品欧美一区二区三区综合在| 成人视屏免费看| 五月综合激情网| 亚洲男人都懂的| 久久伊人蜜桃av一区二区| 欧美唯美清纯偷拍| 国产成人在线看| 日本不卡不码高清免费观看| 亚洲另类色综合网站| 久久亚洲一级片| 91精品国产全国免费观看| 色婷婷综合久色| 成人激情动漫在线观看| 狠狠色丁香久久婷婷综| 午夜一区二区三区视频| 亚洲人亚洲人成电影网站色| 久久久噜噜噜久噜久久综合| www国产精品av| 久久蜜桃av一区精品变态类天堂 | 91久久精品一区二区| 色综合天天综合狠狠| 91在线一区二区三区| 91九色02白丝porn| 色婷婷激情一区二区三区| 色婷婷综合久久久中文字幕| 欧美在线免费视屏| 欧美三级电影网站| 欧美日本一区二区三区四区| 91精品国产综合久久小美女| 日韩三级中文字幕| 国产色产综合产在线视频| 中文字幕+乱码+中文字幕一区| 国产精品天天看| 亚洲综合清纯丝袜自拍| 久久99热这里只有精品| 国产91富婆露脸刺激对白| 白白色 亚洲乱淫| 欧美系列日韩一区| 91精品在线一区二区| 精品国产一区二区亚洲人成毛片| 26uuu精品一区二区三区四区在线| 国产日韩综合av| 亚洲综合av网| 日本va欧美va精品发布| 国产乱一区二区| 91网页版在线| 91精品在线麻豆| 欧美国产精品劲爆| 亚洲午夜久久久久久久久电影网 | 天堂一区二区在线| 国产毛片精品一区| 色婷婷亚洲一区二区三区| 欧美天堂一区二区三区| 26uuu亚洲综合色欧美| 亚洲丝袜制服诱惑| 欧美a级理论片| 99久久精品免费看国产| 9191成人精品久久| 久久精品欧美一区二区三区麻豆| 亚洲三级在线播放| 久久99精品国产.久久久久 | 国产一区二区在线视频| 色哟哟国产精品| 久久久美女毛片| 五月综合激情日本mⅴ| 国产激情精品久久久第一区二区| 日本高清不卡在线观看| 2欧美一区二区三区在线观看视频 337p粉嫩大胆噜噜噜噜噜91av | 91精品国产综合久久精品| 欧美高清在线一区| 日韩av电影天堂| 91美女在线视频| 国产亚洲午夜高清国产拍精品| 亚洲亚洲人成综合网络| 大桥未久av一区二区三区中文| 日韩一区二区视频| 亚洲午夜电影在线| a在线播放不卡| 久久综合色综合88| 午夜精彩视频在线观看不卡| heyzo一本久久综合| 欧美哺乳videos| 日本美女视频一区二区| 欧美专区日韩专区| 亚洲欧美日韩久久| 99久久99久久综合| 久久影视一区二区| 经典三级在线一区| 欧美一级欧美一级在线播放| 亚洲国产成人av网| 色综合久久久久综合| 中文字幕精品一区| 国产成人精品一区二区三区四区 | 亚洲一区二区三区四区五区中文| 国产不卡视频一区| 久久久不卡影院| 国产一区二区三区久久久| 欧美一级二级三级乱码| 无码av免费一区二区三区试看| 欧美丝袜丝交足nylons| 亚洲靠逼com| 欧美亚洲日本国产| 久久99精品国产| 久久久久久久一区| 国产精品资源在线看| 久久精品网站免费观看| 国产精品亚洲一区二区三区在线 | 精品在线免费视频| 日韩女优视频免费观看| 久久精品国产免费| 欧美α欧美αv大片| 国内精品免费在线观看| 欧美xxxx在线观看| 国内精品视频666| 国产香蕉久久精品综合网| 粉嫩一区二区三区在线看| 中文无字幕一区二区三区| 成人av网址在线| 夜夜揉揉日日人人青青一国产精品| 在线日韩av片| 视频一区欧美日韩| 欧美v日韩v国产v| 国产乱子伦一区二区三区国色天香 | 亚洲一区二三区| 91麻豆精品国产自产在线 | 中文字幕欧美一区| 91蜜桃在线免费视频| 石原莉奈一区二区三区在线观看| 日韩欧美中文字幕一区| 国产精品中文字幕欧美| 日韩毛片一二三区| 久久久久久久久久久99999| 精品亚洲国产成人av制服丝袜| 久久久久国产免费免费| 成人aa视频在线观看| 亚洲中国最大av网站| 欧美日韩成人一区| 国产一区二区毛片| 亚洲天堂av一区| 欧美va亚洲va| 99re这里只有精品首页|