If These Halls Could Talk: A Historical Tour through San Francisco Recording Studios (Paperback)
Heather Johnson
- 出版商: Course Technology
- 出版日期: 2006-05-04
- 定價: $900
- 售價: 2.2 折 $199
- 語言: 英文
- 頁數: 350
- 裝訂: Paperback
- ISBN: 1598631411
- ISBN-13: 9781598631418
-
相關分類:
Cisco、Apple Developer
立即出貨(限量) (庫存=4)
買這商品的人也買了...
-
$580$493 -
$450$383 -
$490$382 -
$580$522 -
$680$612 -
$880$748 -
$438$394 -
$480$408 -
$880$581 -
$860$774 -
$680$578 -
$630$498 -
$650$507 -
$680$537 -
$520$260 -
$680$578 -
$650$553 -
$580$458 -
$520$442 -
$750$593 -
$580$452 -
$450$356 -
$620$558 -
$480$408 -
$780$616
相關主題
商品描述
Description
Innovative Cryptography, second edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations.
In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational-probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type.
Innovative Cryptography, second edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals.
Features
- Provides analysis and evaluation of the results of using controlled substitution-permutation networks (CSPNs) and permutation networks (PNs) for implementing data-dependent operations
- Discusses the issue of introducing a new command into universal processors, which will sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type
- Covers the mathematical basics of symmetric and asymmetric cryptography, including the systems of public key distribution and digital signatures
- Explores new advances in the development of the practical approaches to the synthesis of block ciphers based on controlled transforms
- Provides classification and description of mathematical properties of new cryptographic primitives
- Presents cryptoschemes oriented toward effective use of data-dependent operations, a range of new fast block ciphers, and evaluates their resistance to cryptanalysis.
Table of Contents
Introduction; Chapter 1:Cryptography in the Information Age; Chapter 2: Flexible Software Ciphers; Chapter 3:Controlled Permutation; Chapter 4:Controlled Operational Substitutions; Chapter 5: Designing Fast Ciphers Based on Controlled Operations; Chapter 6: Elements of the Cryptanalysis of Ciphers Based on Controlled Operations; Conclusion; Glossary;References; Index
商品描述(中文翻譯)
《創新密碼學》第二版提供了對當前密碼學研究成果的尖端評估和回顧,並探討如何有效實施這些新技術。本書涵蓋了當前的密碼學問題並提出實用解決方案。書中還討論了對稱密碼和對稱分組密碼的作用,並詳細介紹了硬體(DES)、軟體(RC5、Blowfish)和通用(AES、RC6、Twofish、IDEA、GOST)實現所需的快速對稱密碼。
此外,本書還涵蓋了與軟體導向密碼的開發和設計相關的問題,包括基於秘密金鑰形成的算法的密碼。還考慮了與具有靈活的數據轉換算法的密碼的密碼強度相關的一些具體問題,並提出了一種組合概率模型,用於獲得正在考慮的軟體密碼的最小評估。還討論了一個非常有前景的新命令,建議在通用處理器中使用。該命令執行受控位置置換,預計能夠大幅提高包括任意類型位置置換在內的密碼算法的性能。
《創新密碼學》第二版適用於所有從事密碼學工具開發的人員,包括工程師、研究人員、程序員和IT安全專業人員。
特點:
- 提供對使用受控置換-置換網絡(CSPN)和置換網絡(PN)實現數據相依操作的結果進行分析和評估
- 討論將新命令引入通用處理器的問題,該命令將大幅提高包括任意類型位置置換在內的密碼算法的性能
- 涵蓋對稱和非對稱密碼學的數學基礎,包括公鑰分發系統和數字簽名系統
- 探索基於受控變換的區塊密碼實現的實用方法的新進展
- 提供對新的密碼學原理的分類和描述
- 提出針對數據相依操作的有效使用、一系列新的快速區塊密碼的密碼方案,並評估它們對密碼分析的抵抗力。
目錄:
- 引言
- 第1章:信息時代的密碼學
- 第2章:靈活的軟體密碼
- 第3章:受控置換
- 第4章:受控操作替換
- 第5章:基於受控操作的快速密碼設計
- 第6章:密碼分析的基本元素
- 結論
- 附錄
- 參考文獻
- 索引