亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? book-index.html

?? 應用密碼學電子書籍
?? HTML
?? 第 1 頁 / 共 5 頁
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Index</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=Index//-->
<!--PAGES=743-758//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="appendix-b.html">Previous</A></TD>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="ewtoc.html">Next</A></TD></TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Index</FONT></H2>
<DL>
<DD>A5, 389, 662&#150;667
<DD>Abadi, Martin, 66
<DD>Absolute rate, of language, 234
<DD>Accreditation, 103
<DD>Active attacks, 27
<DD>Active cheaters, 27
<DD>Adams, Carlisle, 334
<DD>Adaptive-chosen-plaintext attack, 6
<DD>Addition chaining, 244
<DD>Additive generators, 390&#150;392
<DD>Adjudicated protocol, 26, 71
<DD>Adjudicator, 26
<DD>Adleman, Leonard M., 163&#150;164, 467
<DD>Adler, Roy, 266
<DD>Agnew, G. B., 423
<DD>Algebraic structure, DES, 282&#150;283
<DD>Algorithm M, 393&#150;394
<DD>Algorithms, 2&#150;4, 17
<DL>
<DD>all-or-nothing disclosure of secrets, 543&#150;546
<DD>Asmuth-Bloom, 529&#150;530
<DD>Barrett&#146;s, 244
<DD>Berlekamp-Massey algorithm, 380, 404
<DD>block
<DL>
<DD>chain mode, 206&#150;207
<DD>choosing, 354&#150;355
<DD>replay, 191&#150;193
</DL>
<DD>breaking, 8
<DD>CAST, 334&#150;335
<DD>choosing, 214&#150;216
<DD>cipher block chaining mode, 193&#150;197, 208&#150;210
<DD>cipher block chaining of plaintext difference mode, 208
<DD>cipher block chaining with checksum, 207&#150;208
<DD>cipher-feedback mode, 200&#150;202, 208&#150;210
<DD>cipher mode
<DL>
<DD>choosing, 208&#150;210
<DD>summary, 209
</DL>
<DD>classes, 217
<DD>coin flipping
<DL>
<DD>using Blum integers, 543
<DD>using exponentiation modulo <I>p</I>, 542&#150;543
<DD>using square roots, 541&#150;542
</DL>
<DD>complexity, 237&#150;239
<DD>constant, 238
<DD>convertible undeniable signatures, 538&#150;539
<DD>counter mode, 205&#150;206, 209
<DD>cubic, 238
<DD>data compression, 226
<DD>designated confirmer signatures, 539&#150;540
<DD>Diffie-Hellman, fair, 546&#150;547
<DD>digital signatures, 39
<DD>exponential, 238
<DD>for export, 215&#150;216
<DD>extended Euclidean, 246&#150;248
<DD>factoring, 256
<DD>ISO/IEC 9979 registered, 607
<DD>Karnin-Greene-Hellman, 530
<DD>Khafre, 317&#150;318
<DD>Khufu, 317
<DD>linear, 238
<DD>linear syndrome, 381
<DD>modes, DES, 277&#150;278
<DD>multiple block
<DL>
<DD>cascading, 367&#150;368
<DD>combining, 368
</DL>
<DD>multiple-key public-key cryptography, 527&#150;528
<DD>oblivious transfer, 550
<DD>one-way accumulators, 543
<DD>output-feedback mode, 203&#150;205, 208&#150;210
<DD>output feedback with a nonlinear function, 208
<DD>plaintext block chaining mode, 208
<DD>plaintext feedback mode, 208
<DD>polynomial, 238
<DD>polynomial-time, 238
<DD>probabilistic encryption, 552&#150;554
<DD>propagating cipher block chaining mode, 207
<DD>public-key, 4&#150;5, 33
<DD>quadratic, 238
<DD>quantum cryptography, 554&#150;557
<DD>restricted, 3
<DD>running times, 238&#150;239
<DD>secret-sharing algorithms, 528&#150;531
<DD>secure multiparty computation, 551&#150;552
</DL>
<DD>Algorithms (<I>Cont.</I>)
<DL>
<DD>security, 8&#150;9
<DD>self-synchronizing stream cipher, 198&#150;199
<DD>stream ciphers, 197&#150;198
<DD>subliminal-channel signature, 79
<DD>superpolynomial, 238
<DD>symmetric, 4
<DD>synchronous stream cipher, 202&#150;203
<DD>TEA, 346
<DD>types, 189
<DD>unconditionally secure, 8
<DD>undeniable digital signatures, 536&#150;539
<DD>using, 213&#150;229
<DD>vector scheme, 529
<DD>zero-knowledge proofs, 548&#150;550
<DD><I>See also</I> Block ciphers; Stream ciphers
</DL>
<DD>All-or-nothing disclosure of secrets, 96, 543&#150;546
<DL>
<DD>voting with a single central facility, 128&#150;130
</DL>
<DD>Alternating stop-and-go generator, 383, 385, 410&#150;411
<DD>American National Standards Institute, DES approval, 267&#150;268
<DD>Anderson, Ross, 391
<DD>ANDOS, <I>see</I> All-or-nothing disclosure of secrets
<DD>Anonymous message broadcast, 137&#150;139
<DD>ANSI X3.105, 267
<DD>ANSI X3.106, 267
<DD>ANSI X9.8, 267
<DD>ANSI X9.17, 268, 359
<DL>
<DD>key generation, 175
</DL>
<DD>ANSI X9.19, 267
<DD>ANSI X9.26, 268
<DD>Arbitrated protocol, 23&#150;26
<DD>Arbitration, timestamping, 75&#150;76
<DD>Arbitrator, 23
<DL>
<DD>document signing with, 35&#150;37
<DD>group signatures with, 84&#150;85
</DL>
<DD>AR hash function, 453
<DD>Arithmetic, modular, 242&#150;245
<DD>Arms Export Control Act, 610
<DD>Asmuth-Bloom scheme, 529&#150;530
<DD>Association for Computing Machinery, 608
<DD>Asymmetric algorithms, <I>see</I> Public-key algorithms
<DD>Atomic Energy Act, 610
<DD>Attack, 5
<DD>AT&ampT Model 3600 Telephone Security Device, 594&#150;595
<DD>Authentication, 2, 52&#150;56
<DL>
<DD>DASS, 62
<DD>Denning-Sacco protocol, 63
<DD>dictionary attacks, 52
<DD>ISO framework, 574&#150;577
<DD>Kerberos, 60
<DD>message, 56
<DD>Needham-Schroeder protocol, 58&#150;59
<DD>Neuman-Stubblebine protocol, 60&#150;62
<DD>Otway-Rees protocol, 59&#150;60
<DD>protocols, formal analysis, 65&#150;68
<DD>salt, 52&#150;53
<DD>Schnorr, 511
<DD>SESAME, 572
<DD>SKEY, 53
<DD>SKID, 55&#150;56
<DD>using interlock protocol, 54&#150;55
<DD>using one-way functions, 52
<DD>using public-key cryptography, 53&#150;54
<DD>Wide-Mouth Frog protocol, 56&#150;57
<DD>Woo-Lam protocol, 63&#150;64
<DD>Yahalom, 57&#150;58
</DL>
<DD>Authenticators, 568
<DD>Avalanche effect, 273
<DD>Backup keys, 181&#150;182
<DD>BAN logic, 66&#150;67
<DD>Barrett&#146;s algorithm, 244
<DD>BaseKing, 346
<DD>Basis, polarization measurement, 555
<DD>Battista, Leon, 11
<DD>BBS generator, 417
<DL>
<DD>add to spelled out, 553&#150;554
</DL>
<DD>Beacons, 64
<DD>Bellovin, Steve, 518, 520&#150;521, 571
<DD>Bennett, Charles, 555, 557
<DD>Berlekamp-Massey algorithm, 380, 404
<DD>Bernstein, Dan, 616
<DD>Berson, Tom, 441
<DD>Best affine approximation attack, 381
<DD>Beth-Piper stop-and-go generator, 383&#150;384
<DD>Bias, 425
<DD>Bidirectional message authentication codes, 457
<DD>Biham, Eli, 284&#150;285, 288, 296, 301, 303, 306, 308, 311&#150;312, 314, 316, 319, 354, 361, 434
<DD>Bilateral stop-and-go generator, 384&#150;385
<DD>Binary trees, 78
<DD>Biotechnology, as cryptanalysis tool, 156&#150;157
<DD>Birthday attack, 165&#150;166, 430
<DD>Bit commitment, 86&#150;88
<DL>
<DD>using one-way functions, 87&#150;88
<DD>using pseudo-random-sequence generators, 88
<DD>using symmetric cryptography, 86&#150;87
</DL>
<DD>Blakley, George, 72, 529
<DD>Blaze, Matt, 346, 364
<DD>Blinding factor, 112
<DD>Blind signatures, 112&#150;115, 549&#150;550
<DL>
<DD>patents, 115
<DD>voting with, 126&#150;127
</DL>
<DD>Blobs, 88
<DD>Block algorithms, 4
<DD>Block chain mode, 206&#150;207
<DD>Block ciphers, 4, 189
<DL>
<DD>Blowfish, 336&#150;339
<DD>CA-1.1, 327&#150;328
<DD>cascading algorithms, 367&#150;368
<DD>CAST, 334&#150;335
<DD>CDMF key shortening, 366
<DD>choosing algorithms, 354&#150;355
<DD>combining algorithms, 368
<DD>counter mode, 205&#150;206, 209
<DD>Crab, 342&#150;344
<DD>CRYPTO-MECCANO, 346
<DD>designing, 351
<DD>design theory, 346&#150;351
<DL>
<DD>Feistel networks, 347
<DD>group structure, 348
<DD>S-box, 349&#150;351
<DD>simple relations, 347&#150;348
<DD>strength against differential and linear cryptanalysis, 348&#150;349
<DD>weak keys, 348
</DL>
<DD>double encryption, 357&#150;358
<DD>double OFB/counter, 363&#150;364
<DD>doubling length, 363
<DD>electronic codebook mode, 189&#150;191, 208&#150;210
<DD>encryption speeds, 355
<DD>FEAL, 308&#150;312
<DD>feedback, 193
<DD>GOST, 331&#150;334
<DD>IDEA, 319&#150;325
<DD>iterated, 347
<DD>Li-Wang algorithm, 346
<DD>LOKI, 314&#150;316
<DD>Lucifer, 303&#150;304
<DD>Madryga, 304&#150;306
<DD>McEliece algorithm, 346
<DD>MMB, 325&#150;327
<DD>multiple encryption, 357
<DD>NewDES, 306&#150;308
<DD>Rao-Nam algorithm, 346
<DD>RC2, 318&#150;319
<DD>RC5, 344&#150;346
<DD>REDOC II, 311&#150;313
<DD>REDOC III, 313
<DD>SAFER K-64, 339&#150;341
<DD>security, based on one-way hash functions, 353&#150;354
<DD>Skipjack, 328&#150;329
<DD>versus stream ciphers, 210&#150;211
<DD>SXAL8/MBAL, 344
<DD>triple encryption, 358&#150;363
<DD>3&#150;Way, 341&#150;342
<DD>using one-way hash functions, 351&#150;354
<DD>whitening, 366&#150;367
<DD>xDES<SUP>1</SUP>, 365&#150;366
</DL>
<DD>Block length, doubling, 363
<DD>Block replay, 191&#150;193
<DD>Blocks, 4
<DD>Blowfish, 336&#150;339, 354, 647&#150;654
<DD>Blum, Manuel, 89, 105, 108
<DD>Blum, Blum, and Shub generator, 417&#150;418
<DD>Blum integers, 253
<DL>
<DD>coin flipping, 543
<DD>zero-knowledge proofs, 549
</DL>
<DD>Blum-Micali generator, 416&#150;417
<DD>Boolean functions, in S-boxes, 350
<DD>Bosselaers, Antoon, 436, 441
<DD>Boyar, Joan, 369
<DD>Brassard, Gilles, 555, 557
<DD>Broadcasting:
<DL>
<DD>anonymous, 137&#150;139
<DD>secret, 523&#150;524
</DL>
<DD>Brute-force attack, 8, 151&#150;152
<DL>
<DD>software-based, 154&#150;155
<DD>time and cost estimates, 152&#150;154
</DL>
<DD>Bureau of Export Administration, 610&#150;611
<DD>Burrows, Michael, 66
<DD>CA-1.1, 327&#150;328
<DD>Cade algorithm, 500&#150;501
<DD>Caesar Cipher, 11
<DD>CAFE, 606&#150;607
<DD>CALC, 346
<DD>Cantwell Bill, 615&#150;616
<DD>Capstone, 593&#150;594
<DD>Cascade generators, 405
<DD>Cascades, Gollmann, 387&#150;388
<DD>Cascading:
<DL>
<DD>multiple block algorithms, 367&#150;368
<DD>multiple stream ciphers, 419&#150;420
</DL>
<DD>Cash, digital, <I>see</I> Digital cash
<DD>Cassells, Ian, 381
<DD>CAST, 334&#150;335
<DL>
<DD>S-boxes, 349
</DL>
<DD>CBC, <I>see</I> Cipher block chaining mode
<DD>CCEP, 269, 598&#150;599
<DD>CDMF, 366, 574
<DD>Cellhash, 446
<DD>Cellular automata, 500
<DD>Cellular automaton generator, 414
<DD>Certificates:
<DL>
<DD>Privacy-Enhanced Mail, 579
<DD>public-key, 185&#150;187
<DD>X.509, 574&#150;575
</DL>
<DD>Certification authority, 186
<DD>Certification path, 576
<DD>Certified mail, digital, 122&#150;123
<DD>Chaining variables, 436
<DD>Chambers, Bill, 385&#150;386
<DD>Characteristics, 286&#150;288
<DD>Chaum, David, 84, 115, 133, 137, 536, 549
<DD>Cheater, 27
<DL>
<DD>sharing secrets with, 531
</DL>
<DD>Chess Grandmaster Problem, 109
<DD>Chinese Lottery, 156&#150;157
<DD>Chinese remainder theorem, 249&#150;250, 470
<DD>Chor-Rivest knapsack, 466
<DD>Chosen-ciphertext attack, 6&#150;7, 471&#150;472
<DD>Chosen-key attack, 7
<DD>Chosen-plaintext attack, 6&#150;7, 359
<DD>Chosen-text attack, 7
<DD>Cipher:
<DL>
<DD>substitution, 10&#150;12
<DD>transposition, 12
</DL>
<DD>Cipher block chaining mode, 193&#150;197, 208&#150;210
<DL>
<DD>DES, 277&#150;278
<DD>error extension, 196
<DD>error propagation, 195&#150;196
<DD>initialization vector, 194
<DD>message authentication codes, 456
<DD>padding, 195
<DD>security, 196&#150;197
<DD>self-recovering, 196
<DD>triple encryption, 360&#150;361
</DL>
<DD>Cipher block chaining of plaintext difference mode, 208
<DD>Cipher block chaining with checksum, 207&#150;208
<DD>Cipher-feedback mode, 200&#150;202, 208&#150;210
<DL>
<DD>DES, 277
<DD>error propagation, 201&#150;202
<DD>initialization vector, 201
</DL>
<DD>Cipher mode:
<DL>
<DD>choosing, 208&#150;210
<DD>summary, 208&#150;210
</DL>
<DD>Ciphertext, 1&#150;2
<DL>
<DD>auto key, 198
<DD>hiding in ciphertext, 227&#150;228
<DD>pairs, differential cryptanalysis, 285
<DD>stealing, 191
</DL>
<DD>Ciphertext-only attack, 5&#150;6
<DD>Cleartext, <I>see</I> Plaintext
<DD>Clipper chip, 591&#150;593
<DD>Clipper key-escrow, 328
<DD>Clipper phone, 594
<DD>Clock-controlled generators, 381
<DD>Clocking, 381
<DD>CoCom, 610
<DD>Code, 9
<DD>Coefficients, solving for, 248
<DD>Coin flipping, 89&#150;92
<DL>
<DD>fair, 541&#150;543
<DD>into a well, 92
<DD>key generation, 92
<DD>using Blum integers, 543
<DD>using one-way functions, 90
<DD>using public-key cryptography, 90&#150;91

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
黄色小说综合网站| 欧美日韩成人高清| 国产一区二区三区最好精华液| 亚洲永久免费视频| 欧美伦理电影网| 91在线观看免费视频| 国产精品一区二区男女羞羞无遮挡| 欧美一二三四在线| 精品国产一区二区亚洲人成毛片 | 精品一区二区免费看| 亚洲精品第一国产综合野| 国产精品毛片大码女人| 国产丝袜在线精品| 国产午夜亚洲精品不卡| 欧美精品一区二区三区久久久| 欧美精品一卡二卡| 日韩欧美三级在线| 日韩免费一区二区| 精品欧美一区二区久久| 亚洲三级在线播放| av高清不卡在线| 不卡视频在线看| 91首页免费视频| 欧美日韩国产123区| 欧美一区午夜视频在线观看| 欧美日韩国产大片| 精品欧美乱码久久久久久| 久久久综合精品| 中文字幕永久在线不卡| 一区二区三区成人在线视频| 亚洲一二三四久久| 日日骚欧美日韩| 精品中文av资源站在线观看| 国产成人8x视频一区二区| www.日韩av| 91精品国产麻豆国产自产在线| 日韩免费成人网| 一区二区三区欧美日| 青青草97国产精品免费观看无弹窗版 | 色丁香久综合在线久综合在线观看 | 91成人免费在线视频| 欧美电影一区二区| 国产偷国产偷亚洲高清人白洁| 亚洲精选免费视频| 国产精品1区2区3区在线观看| 91高清视频在线| 国产亚洲精品bt天堂精选| 亚洲一级不卡视频| av激情亚洲男人天堂| 日韩视频免费观看高清完整版| 中文字幕 久热精品 视频在线| 亚洲不卡在线观看| 99久久精品免费看国产| 久久综合99re88久久爱| 亚洲韩国一区二区三区| 东方欧美亚洲色图在线| 精品久久国产老人久久综合| 亚洲国产日韩综合久久精品| 91同城在线观看| 国产欧美1区2区3区| 国产一区 二区| 日韩女优av电影在线观看| 午夜激情一区二区| 欧美久久久久久久久| 亚洲国产日韩a在线播放性色| 色综合亚洲欧洲| 亚洲激情五月婷婷| 色就色 综合激情| 亚洲愉拍自拍另类高清精品| 在线观看免费成人| 一区二区三区欧美激情| 91福利国产成人精品照片| 一区二区三区日韩| 337p亚洲精品色噜噜狠狠| 欧美日韩一区三区四区| 91久久线看在观草草青青| **性色生活片久久毛片| 99vv1com这只有精品| 亚洲国产aⅴ天堂久久| 欧美猛男超大videosgay| 日本系列欧美系列| 精品少妇一区二区三区免费观看| 国产精品资源网| 亚洲美女区一区| 欧美欧美欧美欧美| 国产剧情一区二区| 一区二区三区欧美激情| 日韩无一区二区| 成人黄色在线网站| 人禽交欧美网站| 亚洲国产成人一区二区三区| 全国精品久久少妇| 久久99最新地址| 国产欧美日产一区| 欧美日韩午夜精品| 国产精品系列在线观看| 久久精品国产澳门| 国产欧美综合在线观看第十页| 色综合色狠狠天天综合色| 美女被吸乳得到大胸91| 亚洲欧洲av在线| 精品国产区一区| 欧美男男青年gay1069videost | 成人午夜精品在线| 首页国产欧美日韩丝袜| 国产日产亚洲精品系列| 色婷婷久久久亚洲一区二区三区| 麻豆精品精品国产自在97香蕉| 亚洲激情图片小说视频| 国产欧美一区二区精品性| 在线播放中文一区| 日本精品一区二区三区高清 | 成人理论电影网| 狠狠色2019综合网| 九九视频精品免费| 日本不卡一二三区黄网| 亚洲丶国产丶欧美一区二区三区| 亚洲色图一区二区三区| √…a在线天堂一区| 国产网红主播福利一区二区| xnxx国产精品| 久久先锋影音av| 久久久久久久久岛国免费| 欧美成人一区二区三区片免费| 7777精品伊人久久久大香线蕉经典版下载| 日本高清免费不卡视频| 欧美视频一二三区| 欧美一区二区三区四区视频| 欧美一区二区三区白人| 久久久国产精华| 国产精品人成在线观看免费| 中文字幕日韩欧美一区二区三区| 亚洲丝袜制服诱惑| 偷窥少妇高潮呻吟av久久免费| 久久99久久久欧美国产| 国产在线精品一区二区三区不卡| 韩国女主播一区二区三区| 成人福利视频在线看| 欧美日韩高清一区二区| 国产偷国产偷亚洲高清人白洁| 最新中文字幕一区二区三区| 亚洲一区在线观看视频| 另类小说一区二区三区| 成人免费黄色大片| 91精品在线一区二区| 国产精品久久久久久久久免费桃花 | 日韩成人午夜电影| 成人免费毛片片v| 日韩女优制服丝袜电影| 亚洲久草在线视频| 国产精品一区二区黑丝| 欧美日韩极品在线观看一区| 久久久亚洲精品一区二区三区| 91精品免费在线| 亚洲人吸女人奶水| 免费一级欧美片在线观看| 亚洲一区二区三区中文字幕| 欧美sm美女调教| 日韩欧美你懂的| 日韩中文字幕区一区有砖一区 | 丁香激情综合国产| 日韩欧美国产三级电影视频| 综合自拍亚洲综合图不卡区| 国产在线观看免费一区| 91精品福利在线一区二区三区| 亚洲精品久久久久久国产精华液| 成人午夜av影视| 中文字幕第一区综合| 国产综合一区二区| 2欧美一区二区三区在线观看视频| 亚洲一区二区三区在线播放| 91浏览器在线视频| 久草中文综合在线| 国产精品一二三四区| 欧美成人精精品一区二区频| 视频一区国产视频| 91精品国产综合久久婷婷香蕉 | 欧美日韩aaa| 青青草伊人久久| 国产亚洲一区二区三区| 粉嫩绯色av一区二区在线观看| 国产视频一区二区在线观看| 成人午夜大片免费观看| 亚洲精选视频在线| 欧美一级专区免费大片| 国产麻豆成人精品| 亚洲欧美激情插 | 精品国产91久久久久久久妲己 | 五月婷婷激情综合网| 欧美一区日韩一区| www.av亚洲| 午夜电影网一区| 亚洲国产精品高清| 91行情网站电视在线观看高清版| 青椒成人免费视频| 国产精品不卡视频| 日韩欧美一区在线观看| 成人黄色av电影| 日韩精品久久理论片| 中文字幕va一区二区三区|