Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Stinson D.R. — Cryptography: Theory and practice
Stinson D.R. — Cryptography: Theory and practice



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Cryptography: Theory and practice

Автор: Stinson D.R.

Аннотация:

First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography...


Язык: en

Рубрика: Математика/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 3-d edition

Год издания: 2005

Количество страниц: 611

Добавлена в каталог: 17.11.2013

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Abelian group      4
Access structure      486
Access structure, basis      487
Access structure, connected      503
Access structure, ideal decomposition      510
Access structure, minimal authorized subset      487
Access structure, monotone property      487
Access structure, threshold      487
Active adversary      362
Active S-box      84
Adaptive algorithm      250
Additive identity      3
Additive inverse      4
Adjoint matrix      17
Advanced Encryption Standard      102
Adversary, active      362
Adversary, passive      363
AES      102
Affine Cipher      11
Affine function      8
Affine — Hill Cipher      42
Algorithm, ($\epsilon$,$Q$)      123
Algorithm, adaptive      250
Algorithm, deterministic      178
Algorithm, generic      246
Algorithm, Las Vegas      123
Algorithm, non-adaptive      249
Algorithm, randomized      123
ALICE      1
Almost strongly universal hash family      155
Associative property      3
Associative property, of cryptosystems      69
Associative property, of elliptic curve      257
Attack model      26
Attack model, for cryptosystem      26
Attack model, for identification scheme      362
Attack model, for signature scheme      284
Attack, chosen ciphertext      26
Attack, chosen message      284
Attack, chosen plaintext      26
Attack, ciphertext only      26
Attack, dictionary      448
Attack, key-only      284
Attack, known LL-key      396
Attack, known message      284
Attack, known plaintext      26
Attack, known session key      396
Attack, off-line      449
Attack, parallel session      357
Authenticated encryption      145
Authenticated key agreement scheme      396
Authentication matrix      146
Authentication tag      120
Authentication, entity      353
authentication, mutual      363
Authorized subset      486
Autokey cipher      24
Average-case success probability      123
Basis      487
Bayes’ Theorem      48
Bellare — Rogaway SKDS      421
BES      518
Bias      80
Big MAC attack      142
Binomial coefficient      33
Birthday paradox      125
Bit generator      323
Bit generator, pseudo-random      323
Bit generator, seed      323
Bit predictor      330
Bit predictor, next      330
Bit predictor, previous      339
Bivariate Lagrange interpolation formula      404
BKDP      525
Blacklisting Scheme      533
Block      410
Block cipher      21
Block length      74
Blom Key Predistribution Scheme, $k = 1$      400
Blom Key Predistribution Scheme, arbitrary $k$      403
Blum — Blum — Shub generator      336
Blum — Goldwasser Public-key Cryptosystem      346
Bob      1
Boolean circuit      488
Boolean circuit, fan-in      488
Boolean circuit, fan-out      488
Boolean circuit, monotone      488
Boolean formula      488
Boolean formula, conjunctive normal form      491
Boolean formula, disjunctive normal form      488
Brickell Secret Sharing Scheme      499
Broadcast encryption scheme      518
Broadcast encryption scheme, privileged subset      518
Broadcast key distribution pattern      525
Burmester triangle attack      443
Burmester — Desmedt Conference KAS      451
Caesar cipher      4
Candidate subkey      87
CBC mode      109
CBC — MAC      144
CCM mode      112
CDH      273
Certificate      367
Certificate path      464
Certificate path validation      465
Certificate path, trust model      464
Certificate path, validation      465
Certificate Revocation      458
Certificate Revocation List      464
Certificate validation      463
Certificate, issuance      458
certificate, revocation      458
Certificate, validation      463
Certificate, X.      509 461
Certification Authority      458
Certification authority, hub      466
CFB mode      111
Challenge      356
Challenge-and-response, for identificaiton scheme      356
Challenge-and-response, for signature scheme      307
Channel      1
Chaum-van Antwerpen Signature Scheme      308
Chinese remainder theorem      170
Chosen ciphertext attack      26
Chosen message attack      284
Chosen plaintext attack      26
cipher block chaining mode      109
cipher feedback mode      109
Ciphertext      1
Ciphertext only attack      26
Ciphertext, stream cipher      22
CKAS      450
Client      459
Closed      3
Cocks Identity-based Public — Key Cryptosystem      475
Code      542
Code, descendant      542
Code, identifiable parent property      543
Code, IPP      543
Code, Reed — Solomon code      551
Code, TA      549
Codeword      542
Codeword, parent      542
Collision Resistant      121
Commutative cryptosystems      69
Commutative property      3
Complete graph      503
Complete multipartite graph      503
Completeness      372
Composite Quadratic Residues problem      338
composition      141
Compression function      120
Computational Diffie — Heilman problem      273
Computational security      45
Concave function      59
Concave function, strictly      59
Conditional entropy      62
Conditional probability      47
Conference key agreement scheme      450
Congruence      3
Congruence, of polynomials      251
Congruent      3
Conjunctive normal form      491
Connected access structure      503
Continued fraction      208
Convergent continued fraction      208
Counter      111
counter mode      111
Counter with cipher-block chaining mode      109
Cover-free family      410
CREDENTIAL      353
CRL      464
cross-certification      466
Cryptanalysis      6
Cryptosystem      1
Cryptosystem, distinguishability of ciphertexts      215
Cryptosystem, endomorphic      67
Cryptosystem, idempotent      69
Cryptosystem, partial break      215
Cryptosystem, product      67
Cryptosystem, public-key      161
Cryptosystem, symmetric-key      161
Cryptosystem, total break      215
Cyclic group      171
Data Encryption Standard      95
DDH      273
Dealer      481
Deception probability      146
Decision Diffie — Hellman problem      273
Decision problem      178
Decomposition construction      510
decryption      473
Decryption rule      1
Decryption rule, stream cipher      22
Degree of polynomial      251
Degree of recurrence      23
Delta CRL      464
Denning — Sacco attack      416
DES      95
Descendant code      542
Determinant      16
Deterministic algorithm      178
dictionary attack      448
Differential      91
Differential cryptanalysis      89
Differential trail      92
Diffie — Hellman Key Agreement Scheme      430
Diffie — Hellman Key Predistribution Scheme      397
Diffie — Hellman problem, computational      273
Diffie — Hellman problem, decision      273
Digital Signature Algorithm      295
Digram      27
Disavowal protocol      307
Discrete logarithm      234
Discrete Logarithm Generator      351
Discrete logarithm problem      234
Discrete Logarithm problem, bit security      268
Discrete Logarithm problem, generic algorithm      246
Discrete Logarithm problem, Index calculus algorithm      244
Discrete Logarithm problem, Pohlig — Hellman algorithm      243
Discrete Logarithm problem, Pollard rho algorithm      240
Discrete Logarithm problem, Shanks’ algorithm      237
Discrete random variable      46
Disjunctive normal form      488
Disruption      364
Distinguishabilityof ciphertexts      215
Distinguishable probability distributions      329
Distinguisher      329
Distinguisher, polynomial-time      329
Distribution rule      493
Distributive property      4
Division of polynomials      251
DSA      295
Dynamic group      517
ECB mode      109
ECDSA      298
ECIES      264
EKE      450
Electronic codebook mode      109
Elgamal Public-key Cryptosystem      235
Elgamal Signature Scheme      288
Elliptic Curve Digital Signature Al¬gorithm      298
Elliptic Curve Factoring algorithm      189
Elliptic Curve Integrated Encryption Scheme      264
Elliptic curve, group      255
Elliptic curve, modulo $p$      258
Elliptic curve, non-singular      255
Elliptic curve, over the reals      255
Elliptic curve, point at infinity      255
Elliptic curve, point compression      262
Elliptic curve, singular      255
Encoding      248
Encrypted Key Exchange      450
Encryption      473
Encryption matrix      49
Encryption rule      1
Encryption rule, stream cipher      22
End user      464
Endomorphic cryptosystem      67
Entity authentication      353
entropy      55
Entropy, conditional      62
Entropy, of a natural language      64
Euclidean algorithm      164
Euclidean algorithm, extended      166
Euler phi-function      9
Euler pseudo-prime      182
Euler’s criterion      180
Event      47
Exclusive-OR      22
Exhaustive key search      6
Existential forgery of a MAC      158
Existential forgery of a signature scheme      285
Expansion function      96
Expansion, continued fraction      208
Explicit key confirmation      435
Extended Euclidean algorithm      166
Factor base      194
Factor base, for discrete logarithms      244
Factoring, elliptic curve algorithm      189
Factoring, general number field sieve      201
Factoring, number field sieve      199
Factoring, Pollard $p - 1$ algorithm      190
Factoring, Pollard rho algorithm      193
Factoring, quadratic sieve      199
Factoring, random squares algorithm      196
Factoring, trial division      189
Fail-stop signature scheme      313
Fan-in      488
Fan-out      488
Federal Information Processing Standards      95
Feige — Fiat — Shamir Identification Scheme      388
Feistel cipher      95
Fermat’s theorem      171
Fiat — Naor KDP      409
Fiat — Shamir signature scheme      317
Field      10
Field of prime power order      250
Filtering operation      94
Fingerprint      540
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2020
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте