Contents
1.3 SUBSTITUTION CIPHERS AND TRANSPOSITION CIPHERS
PART I CRYPTOGRAPHIC PROTOCOLS
2.2 COMMUNICATIONS USING SYMMETRIC CRYPTOGRAPHY
2.5 COMMUNICATIONS USING PUBLIC-KEY CRYPTOGRAPHY
2.7 DIGITAL SIGNATURES WITH ENCRYPTION
2.8 RANDOM AND PSEUDO-RANDOM-SEQUENCE GENERATION
3.3 AUTHENTICATION AND KEY EXCHANGE
3.4 FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE PROTOCOLS
3.5 MULTIPLE-KEY PUBLIC-KEY CRYPTOGRAPHY
3.8 CRYPTOGRAPHIC PROTECTION OF DATABASES
4.3 UNDENIABLE DIGITAL SIGNATURES
4.4 DESIGNATED CONFIRMER SIGNATURES
4.7 FAIL-STOP DIGITAL SIGNATURES
4.8 COMPUTING WITH ENCRYPTED DATA
4.13 ALL-OR-NOTHING DISCLOSURE OF SECRETS
5.2 ZERO-KNOWLEDGE PROOFS OF IDENTITY
Get Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.