Search Results - "public-key cryptography"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 7
- Cryptography 4
- Security measures 3
- Coding theory 2
- Computer networks 2
- Data encryption (Computer science) 2
- Access control 1
- Computer networks x Security measures 1
- Computer programming 1
- Computers 1
- Data structures (Computer science) 1
- Electrical engineering 1
- Electronic circuits 1
- Public key cryptography 1
- Telecommunication systems 1
-
1
-
2
-
3
Understanding Cryptography : A Textbook for Students and Practitioners /
Published 2010Table of Contents: “…Introduction to Cryptography and Data Security -- Stream Ciphers -- The Data Encryption Standard (DES) and Alternatives -- The Advanced Encryption Standard (AES) -- More About Block Ciphers -- to Public-Key Cryptography -- The RSA Cryptosystem -- Public-Key Cryptosystems Based on the Discrete Logarithm Problem -- Elliptic Curve Cryptosystems -- Digital Signatures -- Hash Functions -- Message Authentication Codes (MACs) -- Key Establishment…”
Book -
4
Cryptography theory and practice
Published 2006Table of Contents: “…Classical cryptography -- Shannon's theory -- Block ciphers and the advanced encryption standard -- Cryptographic hash functions -- The RSA Cryptosystem and factoring integers -- Public-key cryptography and discrete logarithms -- Signature schemes -- Pseudo-random number generation -- Identification schemes and entity authentication -- Key distribution -- Key agreement schemes -- Public-key infrastructure -- Secret sharing schemes -- Multicast security and copyright protection…”
Book -
5
Network security essentials applications and standards
Published 2017Table of Contents: “…Symmetric Encryption and Message -- 3. Public-Key Cryptography and Message 4. Key Distribution and User Authentication -- 5. …”
Book -
6
Network security essentials applications and standards
Published 2014Table of Contents: “…Ch. 1 Introduction -- Pt. 1 Cryptography -- Ch. 2 Symmetric Encryption and Message Confidentiality -- Ch. 3 Public-Key Cryptography and Message Authentication -- Pt. 2 Network Security Applications -- Ch. 4 Key Distribution an User Authentication -- Ch. 5 Network Access Control and Cloud Security -- Ch. 6 Transport-Level Security -- Ch. 7 Wireless Network Security -- Ch. 8 Electronic Mail Security -- Ch. 9 IP Security -- Pt. 3 System Security -- Ch. 10 Malicious Software -- Ch. 11 Intruders -- Ch. 12 Firewalls -- App. …”
Book -
7
-
8
Contemporary cryptology the science of information integrity
Published 1992Table of Contents: “…Rueppel -- The first ten years of public key cryptology / Whitfield Diffie -- Public key cryptography / James Nechvatal -- A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms / Paul C. van Oorschot -- Digital signatures / C.J. …”
Book -
9
-
10
Cryptography and network security principles and practice
Published 2014Table of Contents: “…Chapter 0 Guide for Readers and Instructors -- Chapter 1 Overview -- Part One Symmetric Ciphers -- Chapter 2 Classical Encryption Techniques -- Chapter 3 Block Ciphers and the Data Encryption Standard -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- Chapter 5 Advanced Encryption Standard -- Chapter 6 Block Cipher Operation -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- Part Two Asymmetric Ciphers -- Chapter 8 More Number Theory -- Chapter 9 Public-Key Cryptography and RSA -- Chapter 10 Other Public-Key Cryptosystems -- Part Three Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- Chapter 12 Message Authentication Codes -- Chapter 13 Digital Signatures -- Part Four Mutual Trust -- Chapter 14 Key Management and Distribution -- Chapter 15 User Authentication -- Part Five Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- Chapter 17 Transport-Level Security -- Chapter 18 Wireless Network Security -- Chapter 19 Electronic Mail Security -- Chapter 20 IP Security -- Appendix A Projects for Teaching Cryptography and Network Security -- Appendix B Sage Examples -- References -- Credits -- Index -- Online Chapters and Appendices1 -- Part Six System Security -- Chapter 21 Malicious Software -- Chapter 22 Intruders -- Chapter 23 Firewalls -- Part seven Legal And Ethical Issues -- Chapter 24 Legal and Ethical Issues -- Appendix C Sage Exercises -- Appendix D Standards and Standards-Setting Organizations -- Appendix E Basic Concepts from Linear Algebra -- Appendix F Measures of Security and Secrecy -- Appendix G Simplified DES -- Appendix H Evaluation Criteria for AES -- Appendix I More on Simplified AES -- Appendix J Knapsack Public-Key Algorithm -- Appendix K Proof of the Digital Signature Algorithm -- Appendix L TCP/IP and OSI -- Appendix M Java Cryptographic APIs -- Appendix N MD5 and Whirlpool Hash Functions -- Appendix O Data Compression Using ZIP -- Appendix P More on PGP -- Appendix Q The International Reference Alphabet -- Appendix R Proof of the RSA Algorithm -- Appendix S Data Encryption Standard (DES) -- Appendix T Kerberos Encryption Techniques -- Appendix U Mathematical Basis of the Birthday Attack -- Appendix V Evaluation Criteria for SHA-3.…”
Book


