找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Introduction to Cryptography; Principles and Appli Hans Delfs,Helmut Knebl Textbook 2015Latest edition Springer-Verlag GmbH Germany, part o

[復(fù)制鏈接]
查看: 28447|回復(fù): 47
樓主
發(fā)表于 2025-3-21 18:27:33 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Introduction to Cryptography
副標(biāo)題Principles and Appli
編輯Hans Delfs,Helmut Knebl
視頻videohttp://file.papertrans.cn/474/473578/473578.mp4
概述New edition of successful cryptography textbook.Describes SHA-3 standard for cryptographic hash functions (Keccak), elliptic curve cryptosystems, and quantum cryptography.Suitable for undergraduate an
叢書(shū)名稱Information Security and Cryptography
圖書(shū)封面Titlebook: Introduction to Cryptography; Principles and Appli Hans Delfs,Helmut Knebl Textbook 2015Latest edition Springer-Verlag GmbH Germany, part o
描述.The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. .?In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive exte
出版日期Textbook 2015Latest edition
關(guān)鍵詞Advanced Encryption Standard (AES); Cryptographic Protocols; Digital Signatures; Information Security; I
版次3
doihttps://doi.org/10.1007/978-3-662-47974-2
isbn_softcover978-3-662-49966-5
isbn_ebook978-3-662-47974-2Series ISSN 1619-7100 Series E-ISSN 2197-845X
issn_series 1619-7100
copyrightSpringer-Verlag GmbH Germany, part of Springer Nature 2015
The information of publication is updating

書(shū)目名稱Introduction to Cryptography影響因子(影響力)




書(shū)目名稱Introduction to Cryptography影響因子(影響力)學(xué)科排名




書(shū)目名稱Introduction to Cryptography網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Introduction to Cryptography網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Introduction to Cryptography被引頻次




書(shū)目名稱Introduction to Cryptography被引頻次學(xué)科排名




書(shū)目名稱Introduction to Cryptography年度引用




書(shū)目名稱Introduction to Cryptography年度引用學(xué)科排名




書(shū)目名稱Introduction to Cryptography讀者反饋




書(shū)目名稱Introduction to Cryptography讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-22 00:06:52 | 只看該作者
Introduction,e. There is a problem if the message contains confidential information. The message could be intercepted and read by an eavesdropper. Or, even worse, the adversary, as usual referred to here as ., might be able to modify the message during transmission in such a way that the legitimate recipient Bob does not detect the manipulation.
板凳
發(fā)表于 2025-3-22 02:20:16 | 只看該作者
地板
發(fā)表于 2025-3-22 08:32:04 | 只看該作者
5#
發(fā)表于 2025-3-22 10:30:42 | 只看該作者
6#
發(fā)表于 2025-3-22 12:53:45 | 只看該作者
One-Way Functions and Pseudorandomness,. One main problem is that truly random bit sequences of sufficient length are not available in most practical situations. Therefore, one works with pseudorandom bit sequences. They appear to be random, but actually they are generated by an algorithm.
7#
發(fā)表于 2025-3-22 20:21:26 | 只看該作者
8#
發(fā)表于 2025-3-22 22:50:28 | 只看該作者
9#
發(fā)表于 2025-3-23 02:56:35 | 只看該作者
10#
發(fā)表于 2025-3-23 09:15:56 | 只看該作者
Public-Key Cryptography,ryone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography. Then we discuss some of the most important examples of public-key cryptosystems, such as the RSA, ElGamal and Rabin cryptosystems. These all provide encryption and digital signatures.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-7 04:11
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
兴海县| 博客| 通海县| 青河县| 靖远县| 军事| 凯里市| 大竹县| 连州市| 平泉县| 吴堡县| 弋阳县| 榆树市| 芮城县| 苏尼特右旗| 咸阳市| 莱芜市| 彩票| 闵行区| 富平县| 扎赉特旗| 谢通门县| 偃师市| 新晃| 吉林省| 中超| 弥勒县| 集安市| 如东县| 长垣县| 陇南市| 蓬莱市| 江安县| 和硕县| 太仆寺旗| 嘉善县| 光山县| 盐源县| 锡林郭勒盟| 宿松县| 樟树市|