📄 book-index.html
字号:
<HTML>
<HEAD>
<META name=vscategory content="Security Programming Languages"><META name=vsisbn content="0471128457"><META name=vstitle content="Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)"><META name=vsauthor content="Bruce Schneier"><META name=vsimprint content="Wiley Computer Publishing "><META name=vspublisher content="John Wiley & Sons, Inc."><META name=vspubdate content="1/1/96"><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Index</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) { var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"> <table width="640" border="0" cellpadding="0" cellspacing="0"> <tr valign="top"> <td><!-- Begin Ads ITKBAN.BOOKS //-->
<HTML>
<HEAD>
<TITLE></TITLE>
</HEAD>
<BODY>
<TABLE WIDTH=468 height=60 border=0 cellspacing=0 cellpadding=0>
<TR>
<TD>
<TABLE border=0 cellspacing=0 cellpadding=0>
<TR>
<TD WIDTH=129 HEIGHT=60>
<A HREF="/adclick.html/CID=00000c0033d6f71200000000/site=itknowledge/area=itk.books/aamsz=468x60" TARGET="_blank"><IMG SRC="http://adimages.earthweb.com/images/ads/house/dtm_salary/day_night4.gif" BORDER=0 WIDTH=129 HEIGHT=60></a></TD>
<TD WIDTH=339 HEIGHT=60><A HREF="/adclick.html/CID=00000c0033d6f71200000000/site=itknowledge/area=itk.books/aamsz=468x60" TARGET="_blank"><IMG SRC="http://adimages.earthweb.com/images/ads/house/dtm_salary/rightside.gif" BORDER=0 WIDTH=339
HEIGHT=60></a></TD>
</TR>
</TABLE>
<!-- http://www.datamation.com/staff/survey/index.html -->
</TD>
</TR>
</TABLE>
</BODY>
</HTML>
<!-- ITKBAN.BOOKS End Ads //--></td> <td><!-- Begin Ads ITKBAN //--><CENTER><A HREF="/adclick.html/CID=00000b452954e8a400000000/site=itknowledge/area=itk/aamsz=160x60/position=top" TARGET=_top><IMG BORDER=0 SRC="http://adimages.earthweb.com/images/ads/160x60/compaq_dtm_sponsor.gif" ALT="" ></A><BR><A HREF="/adclick.html/CID=00000b452954e8a400000000/site=itknowledge/area=itk/aamsz=160x60/position=top" TARGET=_top></A></CENTER><BR><!-- ITKBAN End Ads //--></td> </tr> <tr><td height="1" colspan="2" bgcolor="#CCCCCC"><img src="/images/white.gif" border=0 alt=""></td></tr> </TABLE><!-- END HEADER --><!-- BEGIN SUB HEADER --> <table bgcolor="#FFFFFF" cellpadding="0" cellspacing="0" border="0" width="100%"> <!-- ITK LOGO Banner --> <tr> <td align="left" valign="top" bgcolor="#FFFFFF"><script>function GetCookie (name){ var arg = name + "="; var alen = arg.length; var clen = document.cookie.length; var i = 0; while (i < clen) { var j = i + alen; if (document.cookie.substring(i, j) == arg) { var end = document.cookie.indexOf (";", j); if (end == -1) end = document.cookie.length; return unescape(document.cookie.substring(j, end)); } i = document.cookie.indexOf(" ", i) + 1; if (i == 0) break; } return null;}var m1='<IMG SRC="';var m2='/images/itk-logo.gif';var m3='" VSPACE="10" WIDTH=434 HEIGHT=58 ALT="ITKnowledge" border="0">';var gifstr=GetCookie("UsrType");if((gifstr!=0 ) && (gifstr!=null)) { m2=gifstr; }document.write(m1+m2+m3);</script></td> </tr><!-- END of ITK LOGO Banner --> <!-- ITK TOPNAV --> <tr> <td align="left" valign="top" nowrap><a href="/"><img src="/images/home1.gif" width=38 height=37 alt="home" border="0"></a> <a href="/pick-account.html"><img src="/images/accountinfo.gif" width=70 height=37 alt="account info" border="0"></a> <a href="/PSUser/usrreg.htm?AdminAction=InitAdd&Locale=en&URI=/"><img src="/images/subscribe2.gif" width=56 height=37 alt="subscribe" border="0" hspace="6"></a> <a href="/PSUser/psuserauth.htm?cmd=login&URI=/"><img src="/images/login1.gif" width=33 height=37 alt="login" hspace="5" border="0"></a> <a href="/search/"><img src="/images/search1.gif" width=43 height=37 alt="search" border="0" hspace="10"></a> <a href="/faq/faq.html"><img src="/images/faqs1.gif" width=40 height=37 alt="FAQ/help" border="0" hspace="0"></a> <a href="/sitemap.html"><img src="/images/sitemap1.gif" width=46 height=37 alt="site map" border="0" hspace="2"></a> <a href="/contactus.html"><img src="/images/contact1.gif" width=61 height=37 alt="contact us" border="0" hspace="4"></a><br> <img src="/images/white.gif" width="1" height="5" alt="" border="0"></td> </tr></table><!-- END of ITK TOPNAV --> <!-- begin of ITK left NAV --><!-- BEGIN LEFT NAV --> <table width=99% border="0" cellpadding="2" cellspacing="0"> <tr> <td bgcolor="#ffffff" width=120 valign="top" rowspan=8> <form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi"> <INPUT TYPE="hidden" NAME="Action" VALUE="Search"> <INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm"> <INPUT TYPE="hidden" NAME="Collection" VALUE="ITK"> <INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts"> <img src="/images/search5.gif" width=115 height=27 alt="" border="0"><br> <img src="/images/white.gif" width="1" height="5" alt="" border="0"><br> <table width="116" height="135" bgcolor="#e0e0e0" border="1" bordercolor="#006666" cellpadding="3" cellspacing="0"> <tr> <td width="116"><input type="text" name="metaqueryText" value="" size="8"> <input type="submit" name="submitbutton" value="Go!"> <INPUT type="hidden" NAME="section_on" VALUE="on"> <font face="Arial,helvetica" size="1"> <SELECT NAME="metatags" style="font-size: 10; font-family: sans-serif;" size="1"> <option value="keyword" SELECTED>Keyword <option value="vstitle">Title <option value="vsauthor">Author <option value="vsisbn">ISBN <option value="vspublisher">Publisher <option value="vsimprint">Imprint </SELECT></font><br> <input type="radio" name="ResultTemplate" value="itk-brief.hts" checked style="background-color: #e0e0e0;"><font face="arial, helvetica" color="#006666" size="1">Brief</font> <input type="radio" name="ResultTemplate" value="itk-full.hts" style="background-color: #e0e0e0;"><font face="arial, helvetica" color="#006666" size="1">Full</font><br> <font face="arial, helvetica" size="1"> <img src="/images/bullet.gif" width=5 height=5 hspace="5" alt="" border="0"> <a href="/search/"><font color="#006666">Advanced</font></a><br> <a href="/search/"><font color="#006666">Search</font></a><br> <img src="/images/bullet.gif" width=5 height=5 hspace="5" alt="" border="0"> <a href="/search/search-tips.html"><font color="#006666">Search Tips</font></a> </font></td></tr></table> </form><!-- BROWSE BY TOPIC --> <form action="" name="catlist"> <img src="/images/browse5.gif" width=115 height=34 alt="" border="0"><table width="120" height="32" border="1" cellspacing="0" cellpadding="3" bordercolor="#006666" bgcolor="#e0e0e0"> <tr> <td width="117" align="center"> <font face="Arial,helvetica" size="1"> <SELECT NAME="cat" onChange='top.location.href=this.options[selectedIndex].value;' style="font-size: 10; font-family: sans-serif;"> <option value="" selected>Please Select <option value="">----------- <option value="/reference/dir.components.html">Components <option value="/reference/dir.contentmanagement.html">Content Mgt <option value="/reference/dir.certification1.html">Certification <option value="/reference/dir.databases.html">Databases <option value="/reference/dir.enterprisemanagement1.html">Enterprise Mgt <option value="/reference/dir.funandgames1.html">Fun/Games <option value="/reference/dir.groupwareandcollaboration1.html">Groupware <option value="/reference/dir.hardware1.html">Hardware <option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev <option value="/reference/dir.middleware.html">Middleware <option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia <option value="/reference/dir.networkservices1.html">Networks <option value="/reference/dir.operatingsystems.html">OS <option value="/reference/dir.productivityapplications1.html">Prod Apps <option value="/reference/dir.programminglanguages.html">Programming <option value="/reference/dir.security1.html">Security <!-- <option value="/reference/dir.ewtraining1.html">Training Guides --> <option value="/reference/dir.userinterfaces.html">UI <option value="/reference/dir.webservices.html">Web Services <option value="/reference/dir.webmasterskills1.html">Webmaster <option value="/reference/dir.y2k1.html">Y2K <option value="">----------- <option value="/reference/whatsnew.html">New Titles <option value="">----------- <option value="/reference/dir.archive1.html">Free Archive </SELECT> </font></td> </tr> </table> </form><!-- LEFT NAV SEARCH END --> </td> <!-- PUB PARTNERS END --><!-- END LEFT NAV --><td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td><td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td><!-- end of ITK left NAV --><!-- begin main content --><td width="100%" valign="top" align="left"><!-- END SUB HEADER -->
<!--Begin Content Column -->
<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">
<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">
</form>
<!-- Empty Reference Subhead -->
<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=Index//-->
<!--PAGES=743-758//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="appendix-b.html">Previous</A></TD>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="ewtoc.html">Next</A></TD></TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Index</FONT></H2>
<DL>
<DD>A5, 389, 662–667
<DD>Abadi, Martin, 66
<DD>Absolute rate, of language, 234
<DD>Accreditation, 103
<DD>Active attacks, 27
<DD>Active cheaters, 27
<DD>Adams, Carlisle, 334
<DD>Adaptive-chosen-plaintext attack, 6
<DD>Addition chaining, 244
<DD>Additive generators, 390–392
<DD>Adjudicated protocol, 26, 71
<DD>Adjudicator, 26
<DD>Adleman, Leonard M., 163–164, 467
<DD>Adler, Roy, 266
<DD>Agnew, G. B., 423
<DD>Algebraic structure, DES, 282–283
<DD>Algorithm M, 393–394
<DD>Algorithms, 2–4, 17
<DL>
<DD>all-or-nothing disclosure of secrets, 543–546
<DD>Asmuth-Bloom, 529–530
<DD>Barrett’s, 244
<DD>Berlekamp-Massey algorithm, 380, 404
<DD>block
<DL>
<DD>chain mode, 206–207
<DD>choosing, 354–355
<DD>replay, 191–193
</DL>
<DD>breaking, 8
<DD>CAST, 334–335
<DD>choosing, 214–216
<DD>cipher block chaining mode, 193–197, 208–210
<DD>cipher block chaining of plaintext difference mode, 208
<DD>cipher block chaining with checksum, 207–208
<DD>cipher-feedback mode, 200–202, 208–210
<DD>cipher mode
<DL>
<DD>choosing, 208–210
<DD>summary, 209
</DL>
<DD>classes, 217
<DD>coin flipping
<DL>
<DD>using Blum integers, 543
<DD>using exponentiation modulo <I>p</I>, 542–543
<DD>using square roots, 541–542
</DL>
<DD>complexity, 237–239
<DD>constant, 238
<DD>convertible undeniable signatures, 538–539
<DD>counter mode, 205–206, 209
<DD>cubic, 238
<DD>data compression, 226
<DD>designated confirmer signatures, 539–540
<DD>Diffie-Hellman, fair, 546–547
<DD>digital signatures, 39
<DD>exponential, 238
<DD>for export, 215–216
<DD>extended Euclidean, 246–248
<DD>factoring, 256
<DD>ISO/IEC 9979 registered, 607
<DD>Karnin-Greene-Hellman, 530
<DD>Khafre, 317–318
<DD>Khufu, 317
<DD>linear, 238
<DD>linear syndrome, 381
<DD>modes, DES, 277–278
<DD>multiple block
<DL>
<DD>cascading, 367–368
<DD>combining, 368
</DL>
<DD>multiple-key public-key cryptography, 527–528
<DD>oblivious transfer, 550
<DD>one-way accumulators, 543
<DD>output-feedback mode, 203–205, 208–210
<DD>output feedback with a nonlinear function, 208
<DD>plaintext block chaining mode, 208
<DD>plaintext feedback mode, 208
<DD>polynomial, 238
<DD>polynomial-time, 238
<DD>probabilistic encryption, 552–554
<DD>propagating cipher block chaining mode, 207
<DD>public-key, 4–5, 33
<DD>quadratic, 238
<DD>quantum cryptography, 554–557
<DD>restricted, 3
<DD>running times, 238–239
<DD>secret-sharing algorithms, 528–531
<DD>secure multiparty computation, 551–552
</DL>
<DD>Algorithms (<I>Cont.</I>)
<DL>
<DD>security, 8–9
<DD>self-synchronizing stream cipher, 198–199
<DD>stream ciphers, 197–198
<DD>subliminal-channel signature, 79
<DD>superpolynomial, 238
<DD>symmetric, 4
<DD>synchronous stream cipher, 202–203
<DD>TEA, 346
<DD>types, 189
<DD>unconditionally secure, 8
<DD>undeniable digital signatures, 536–539
<DD>using, 213–229
<DD>vector scheme, 529
<DD>zero-knowledge proofs, 548–550
<DD><I>See also</I> Block ciphers; Stream ciphers
</DL>
<DD>All-or-nothing disclosure of secrets, 96, 543–546
<DL>
<DD>voting with a single central facility, 128–130
</DL>
<DD>Alternating stop-and-go generator, 383, 385, 410–411
<DD>American National Standards Institute, DES approval, 267–268
<DD>Anderson, Ross, 391
<DD>ANDOS, <I>see</I> All-or-nothing disclosure of secrets
<DD>Anonymous message broadcast, 137–139
<DD>ANSI X3.105, 267
<DD>ANSI X3.106, 267
<DD>ANSI X9.8, 267
<DD>ANSI X9.17, 268, 359
<DL>
<DD>key generation, 175
</DL>
<DD>ANSI X9.19, 267
<DD>ANSI X9.26, 268
<DD>Arbitrated protocol, 23–26
<DD>Arbitration, timestamping, 75–76
<DD>Arbitrator, 23
<DL>
<DD>document signing with, 35–37
<DD>group signatures with, 84–85
</DL>
<DD>AR hash function, 453
<DD>Arithmetic, modular, 242–245
<DD>Arms Export Control Act, 610
<DD>Asmuth-Bloom scheme, 529–530
<DD>Association for Computing Machinery, 608
<DD>Asymmetric algorithms, <I>see</I> Public-key algorithms
<DD>Atomic Energy Act, 610
<DD>Attack, 5
<DD>AT&T Model 3600 Telephone Security Device, 594–595
<DD>Authentication, 2, 52–56
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -