MARC 主機 00000nam a22004333i 4500 
001    EBC231638 
003    MiAaPQ 
005    20200713055107.0 
006    m     o  d |       
007    cr cnu|||||||| 
008    200713s2005    xx      o     ||||0 eng d 
020    9781580536431|q(electronic bk.) 
020    |z9781580536424 
035    (MiAaPQ)EBC231638 
035    (Au-PeEL)EBL231638 
035    (CaPaEBR)ebr10091343 
035    (OCoLC)61158261 
040    MiAaPQ|beng|erda|epn|cMiAaPQ|dMiAaPQ 
050  4 Z103 -- .O66 2005eb 
082 0  652/.8 
100 1  Oppliger, Rolf 
245 10 Contemporary Cryptography 
264  1 Norwood :|bArtech House,|c2005 
264  4 |c©2005 
300    1 online resource (529 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
505 0  Contemporary Cryptography -- Contents vii -- Foreword xv -
       - Preface xix -- References xxiii -- Acknowledgments -- 
       Chapter 1 Introduction 1 -- 1.1 CRYPTOLOGY 1 -- 1.2 
       CRYPTOGRAPHIC SYSTEMS 3 -- 1.3 HISTORICAL BACKGROUND 
       INFORMATION 14 -- 1.4 OUTLINE OF THE BOOK 16 -- References
       18 -- Chapter 2 Cryptographic Systems 21 -- 2.1 UNKEYED 
       CRYPTOSYSTEMS 21 -- 2.2 SECRET KEY CRYPTOSYSTEMS 26 -- 2.3
       PUBLIC KEY CRYPTOSYSTEMS 32 -- 2.4 FINAL REMARKS 42 -- 
       References 42 -- Part I MATHEMATICAL FUNDAMENTALS 45 -- 
       Chapter 3 Discrete Mathematics 47 -- 3.1 ALGEBRAIC BASICS 
       47 -- 3.2 INTEGER ARITHMETIC 63 -- 3.3 MODULAR ARITHMETIC 
       81 -- 3.4 ELLIPTIC CURVES 99 -- 3.5 FINAL REMARKS 101 -- 
       References 102 -- Chapter 4 Probability Theory 103 -- 4.1 
       BASIC TERMS AND CONCEPTS 104 -- 4.2 RANDOM VARIABLES 109 -
       - 4.3 FINAL REMARKS 122 -- References 123 -- Chapter 5 
       Information Theory 125 -- 5.1 INTRODUCTION 125 -- 5.2 
       ENTROPY 129 -- 5.3 REDUNDANCY 136 -- 5.4 KEY EQUIVOCATION 
       AND UNICITY DISTANCE 138 -- 5.5 FINAL REMARKS 139 -- 
       References 140 -- Chapter 6 Complexity Theory 141 -- 6.1 
       PRELIMINARY REMARKS 141 -- 6.2 INTRODUCTION 143 -- 6.3 
       ASYMPTOTIC ORDER NOTATION 146 -- 6.4 EFFICIENT 
       COMPUTATIONS 147 -- 6.5 COMPUTATIONAL MODELS 150 -- 6.6 
       COMPLEXITY CLASSES 154 -- 6.7 FINAL REMARKS 163 -- 
       References 164 -- Part II UNKEYED CRYPTOSYSTEMS 167 -- 
       Chapter 7 One-Way Functions 169 -- 7.1 INTRODUCTION 169 --
       7.2 CANDIDATE ONE-WAY FUNCTIONS 172 -- 7.3 INTEGER 
       FACTORIZATION ALGORITHMS 180 -- 7.4 ALGORITHMS FOR 
       COMPUTING DISCRETE LOGARITHMS 186 -- 7.5 HARD-CORE 
       PREDICATES 188 -- 7.6 ELLIPTIC CURVE CRYPTOGRAPHY 190 -- 
       7.7 FINAL REMARKS 191 -- References 192 -- Chapter 8 
       Cryptographic Hash Functions 195 -- 8.1 INTRODUCTION 195 -
       - 8.2 MERKLE-DAMG° ARD CONSTRUCTION 199 -- 8.3 EXEMPLARY 
       CRYPTOGRAPHIC HASH FUNCTIONS 201 -- 8.4 FINAL REMARKS 214 
       -- References 216 
505 8  Chapter 9 Random Bit Generators 219 -- 9.1 INTRODUCTION 
       219 -- 9.2 REALIZATIONS AND IMPLEMENTATIONS 221 -- 9.3 
       STATISTICAL RANDOMNESS TESTING 223 -- 9.4 FINAL REMARKS 
       224 -- References 225 -- Part III SECRET KEY CRYPTOSYSTEMS
       227 -- Chapter 10 Symmetric Encryption Systems 229 -- 10.1
       INTRODUCTION 229 -- 10.2 BLOCK CIPHERS 236 -- 10.3 STREAM 
       CIPHERS 277 -- 10.4 PERFECTLY SECURE ENCRYPTION 281 -- 
       10.5 FINAL REMARKS 287 -- References 288 -- Chapter 11 
       Message Authentication Codes 291 -- 11.1 INTRODUCTION 291 
       -- 11.2 COMPUTATIONALLY SECURE MACS 294 -- 11.3 
       INFORMATION-THEORETICALLY SECURE MACS 305 -- 11.4 FINAL 
       REMARKS 307 -- References 307 -- Chapter 12 Pseudorandom 
       Bit Generators 309 -- 12.1 INTRODUCTION 309 -- 12.2 
       CRYPTOGRAPHICALLY SECURE PRBG 313 -- 12.3 FINAL REMARKS 
       318 -- References 319 -- Chapter 13 Pseudorandom Functions
       321 -- 13.1 INTRODUCTION 321 -- 13.2 CONSTRUCTIONS 325 -- 
       13.3 RANDOM ORACLE MODEL 327 -- 13.4 FINAL REMARKS 329 -- 
       References 329 -- Part IV PUBLIC KEY CRYPTOSYSTEMS 331 -- 
       Chapter 14 Asymmetric Encryption Systems 333 -- 14.1 
       INTRODUCTION 333 -- 14.2 BASIC SYSTEMS 336 -- 14.3 SECURE 
       SYSTEMS 359 -- 14.4 IDENTITY-BASED ENCRYPTION 363 -- 14.5 
       FINAL REMARKS 365 -- References 365 -- Chapter 15 Digital 
       Signature Systems 369 -- 15.1 INTRODUCTION 369 -- 15.2 
       BASIC SYSTEMS 372 -- 15.3 SECURE SYSTEMS 388 -- 15.4 ONE-
       TIME SIGNATURE SYSTEMS 393 -- 15.5 DIGITAL SIGNATURES FOR 
       STREAMS 395 -- 15.6 VARIATIONS 399 -- 15.7 FINAL REMARKS 
       401 -- References 401 -- Chapter 16 Key Establishment 405 
       -- 16.1 INTRODUCTION 405 -- 16.2 KEY DISTRIBUTION 
       PROTOCOLS 406 -- 16.3 KEY AGREEMENT PROTOCOLS 411 -- 16.4 
       QUANTUM CRYPTOGRAPHY 414 -- 16.5 FINAL REMARKS 419 -- 
       References 420 -- Chapter 17 Entity Authentication 423 -- 
       17.1 INTRODUCTION 423 -- 17.2 AUTHENTICATION TECHNOLOGIES 
       424 -- 17.3 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS 432 
505 8  17.4 FINAL REMARKS 440 -- References 440 -- Chapter 18 
       Secure Multiparty Computation 442 -- 18.1 INTRODUCTION 443
       -- 18.2 MAJOR RESULTS 446 -- 18.3 FINAL REMARKS 446 -- 
       References 447 -- Part V EPILOGUE 449 -- Chapter 19 Key 
       Management 451 -- 19.1 INTRODUCTION 451 -- 19.2 KEY LIFE 
       CYCLE 453 -- 19.3 SECRET SHARING 455 -- 19.4 KEY RECOVERY 
       457 -- 19.5 PUBLIC KEY INFRASTRUCTURE 460 -- 19.6 FINAL 
       REMARKS 463 -- References 464 -- Chapter 20 Conclusions 
       467 -- 20.1 UNKEYED CRYPTOSYSTEMS 467 -- 20.2 SECRET KEY 
       CRYPTOSYSTEMS -- 20.3 PUBLIC KEY CRYPTOSYSTEMS 470 -- 20.4
       FINAL REMARKS 471 -- Chapter 21 Outlook 473 -- 21.1 
       THEORETICAL VIEWPOINT 474 -- 21.2 PRACTICAL VIEWPOINT 476 
       -- References 477 -- Appendix A Abbreviations and Acronyms
       479 -- Appendix B Mathematical Notation 485 -- About the 
       Author 491 -- Index 493 
520    This authoritative work brings you a timely, unified 
       analysis of the various satellite navigation technologies,
       applications, and services in operation or development, 
       and of the challenges that lie ahead in this rapidly 
       evolving field. It describes the segments, signal 
       characteristics, performance, and securities aspects of 
       the GPS system, including the advances anticipated in the 
       next-generation GPS-III, and brings you up to speed on the
       developing European GALILEO system and its innovative 
       characteristics, services, and potential. A look at ground
       -based and satellite-based augmentation systems (GBAS and 
       SBAS) highlights their performance-improving features and 
       how these systems may serve as connection rings between 
       GPS and future networks like GALILEO 
588    Description based on publisher supplied metadata and other
       sources 
590    Electronic reproduction. Ann Arbor, Michigan : ProQuest 
       Ebook Central, 2020. Available via World Wide Web. Access 
       may be limited to ProQuest Ebook Central affiliated 
       libraries 
650  0 Cryptography.;Computer security 
655  4 Electronic books 
776 08 |iPrint version:|aOppliger, Rolf|tContemporary 
       Cryptography|dNorwood : Artech House,c2005|z9781580536424 
856 40 |uhttps://ebookcentral.proquest.com/lib/sinciatw/
       detail.action?docID=231638|zClick to View