Applied Cryptography 2nd ed.zip

  • darkclip
    了解作者
  • Windows_Unix
    开发工具
  • 3.1MB
    文件大小
  • zip
    文件格式
  • 0
    收藏次数
  • 1 积分
    下载积分
  • 0
    下载次数
  • 2018-08-31 08:37
    上传日期
Applied Cryptography 2nd ed. - B. Schneier
Applied Cryptography 2nd ed.zip
  • Applied Cryptography 2nd ed. - B. Schneier.pdf
    8.4MB
内容介绍
<html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta charset="utf-8"> <meta name="generator" content="pdf2htmlEX"> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css"> <link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css"> <link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/6251256774bc5c010594e1b7/raw.css"> <script src="https://static.pudn.com/base/js/compatibility.min.js"></script> <script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script> <script> try{ pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({}); }catch(e){} </script> <title></title> </head> <body> <div id="sidebar" style="display: none"> <div id="outline"> </div> </div> <div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6251256774bc5c010594e1b7/bg1.jpg"><div class="c x1 y1 w2 h2"><div class="t m0 x2 h3 y2 ff1 fs0 fc0 sc0 ls0 ws0"> <span class="_ _0"> </span> <span class="_ _1"> </span> <span class="_ _2"> </span> <span class="_ _3"> </span> <span class="_ _4"> </span> <span class="_ _5"> </span> <span class="_ _6"> </span> </div><div class="t m0 x3 h3 y3 ff1 fs0 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 h3 y4 ff2 fs1 fc1 sc0 ls0 ws0">Brief<span class="ff1 fs0 fc0"> <span class="_ _7"> </span></span>Full</div><div class="t m0 x5 h4 y5 ff2 fs1 fc0 sc0 ls0 ws0"> <span class="fc1">Advanced</span></div><div class="t m0 x6 h4 y6 ff2 fs1 fc0 sc0 ls0 ws0"> <span class="fc1">Search</span></div><div class="t m0 x5 h4 y7 ff2 fs1 fc0 sc0 ls0 ws0"> <span class="fc1">Search Tips</span></div><div class="t m0 x7 h5 y8 ff2 fs2 fc0 sc0 ls0 ws0">To access the contents, click the chapter and section titles.</div><div class="t m0 x7 h6 y9 ff3 fs0 fc0 sc0 ls0 ws0">Applied Cryptography, Second Edition: Protocols, Algorthms, and Source</div><div class="t m0 x7 h6 ya ff3 fs0 fc0 sc0 ls0 ws0">Code in C (cloth)</div><div class="t m0 x7 h7 yb ff4 fs2 fc0 sc0 ls0 ws0">(Publisher: John Wiley &amp; Sons, Inc.)</div><div class="t m0 x7 h8 yc ff1 fs2 fc0 sc0 ls0 ws0">Author(s): Bruce Schneier</div><div class="t m0 x7 h8 yd ff1 fs2 fc0 sc0 ls0 ws0">ISBN: 0471128457</div><div class="t m0 x7 h8 ye ff1 fs2 fc0 sc0 ls0 ws0">Publication Date: 01/01/96</div><div class="t m0 x7 h9 yf ff5 fs2 fc0 sc0 ls0 ws0">Search this book:</div><div class="t m0 x8 h3 y10 ff1 fs0 fc0 sc0 ls0 ws0"> </div><div class="t m0 x9 ha y11 ff3 fs3 fc1 sc0 ls0 ws0">Foreword by Whitfield Diffie</div><div class="t m0 x9 ha y12 ff3 fs3 fc1 sc0 ls0 ws0">Preface</div><div class="t m0 x9 ha y13 ff3 fs3 fc1 sc0 ls0 ws0">About the Author</div><div class="t m0 xa ha y14 ff3 fs3 fc1 sc0 ls0 ws0">Chapter 1&#8212;Foundations</div><div class="t m0 xb h6 y15 ff3 fs0 fc1 sc0 ls0 ws0">1.1 Terminology</div><div class="t m0 xb h6 y16 ff3 fs0 fc1 sc0 ls0 ws0">1.2 Steganography</div><div class="t m0 xb h6 y17 ff3 fs0 fc1 sc0 ls0 ws0">1.3 Substitution Ciphers and Transposition Ciphers</div><div class="t m0 xb h6 y18 ff3 fs0 fc1 sc0 ls0 ws0">1.4 Simple XOR</div><div class="t m0 xb h6 y19 ff3 fs0 fc1 sc0 ls0 ws0">1.5 One-Time Pads</div><div class="t m0 xb h6 y1a ff3 fs0 fc1 sc0 ls0 ws0">1.6 Computer Algorithms</div><div class="t m0 xb h6 y1b ff3 fs0 fc1 sc0 ls0 ws0">1.7 Large Numbers</div><div class="t m0 x9 ha y1c ff3 fs3 fc1 sc0 ls0 ws0">Part I&#8212;Cryptographic Protocols</div><div class="t m0 xa ha y1d ff3 fs3 fc1 sc0 ls0 ws0">Chapter 2&#8212;Protocol Building Blocks</div><div class="t m0 xb h6 y1e ff3 fs0 fc1 sc0 ls0 ws0">2.1 Introduction to Protocols</div><div class="t m0 xb h6 y1f ff3 fs0 fc1 sc0 ls0 ws0">2.2 Communications Using Symmetric Cryptography</div><div class="t m0 xb h6 y20 ff3 fs0 fc1 sc0 ls0 ws0">2.3 One-Way Functions</div><div class="t m0 xb h6 y21 ff3 fs0 fc1 sc0 ls0 ws0">2.4 One-Way Hash Functions</div><div class="t m0 xb h6 y22 ff3 fs0 fc1 sc0 ls0 ws0">2.5 Communications Using Public-Key Cryptography</div><div class="t m0 xb h6 y23 ff3 fs0 fc1 sc0 ls0 ws0">2.6 Digital Signatures</div></div><div class="c xc y24 w3 hb"><div class="t m1 xd hc y25 ff6 fs4 fc0 sc0 ls0 ws0">Go!</div></div><div class="c xe y26 w4 hd"><div class="t m2 xd he y27 ff6 fs5 fc0 sc0 ls0 ws0">Keyword</div></div><div class="c x4 y28 w5 hf"><div class="t m3 xd h10 y29 ff6 fs6 fc0 sc0 ls0 ws0">-----------</div></div><div class="c xf y2a w3 h11"><div class="t m3 xd h12 y2b ff6 fs7 fc0 sc0 ls0 ws0">Go!</div></div><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a><a class="l" rel='nofollow' onclick='return false;'><div class="d m4"></div></a></div><div class="pi" data-data='{"ctm":[1.568627,0.000000,0.000000,1.568627,0.000000,0.000000]}'></div></div> </body> </html>
评论
    相关推荐