Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Buy

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the invention of public-key cryptography. It started in 1976 when Dime and Hcllman formulated their public-key distribu- tion system and formally defined public-key cryptosystems. Two years later two practical implementations of public-key cryptosystems were published. One was designed by Rivest, Shamir, and Adleman (called the RSA system); the authors based the system on the two "difficult" numerical problems: dis- crete logarithm and factorization. The other invented by Merklc and Hcllman was based on the knapsack problem, which is even "harder" than these used in the RSA system. Since that time cryptography, traditionally seen as the theory of encryption algorithms, has extended its scope enormously. Now it comprises many new areas, namely authentication, digital signature, hash- ing, secret sharing, design and verification of cryptographic protocols, zero knowledge protocols, quantum cryptography, etc.

This work presents recent developments in secure hashing algorithm design. The main part of the work was written when the authors were with the Department of Computer Science, University of New South Wales, Aus- tralian Defence Force Academy, and Babak Sadeghiyan was a PhD student working with Josef Pieprzyk as his supervisor.

(HTML tags aren't allowed.)

Learning Drupal 6 Module Development
Learning Drupal 6 Module Development
Drupal is a highly successful open-source Content Management System (CMS). It is well‑respected for its robustness, its flexible and immaculate code, and its seemingly infinite capacity for extension and customization.

Drupal 6, released early in 2008, represents a significant evolution in this already mature CMS. In this book, we
...
HTML, XHTML, and CSS: Complete
HTML, XHTML, and CSS: Complete
Part of the highly successful Shelly Cashman series, this text provides a complete overview of HTML and leads the user through a clear, step-by-step, screen-by-screen approach to learning. Readers learn how to create a Web page using HTML, format the page, add graphics, and more....
MCSA/MCSE 2003 JumpStart
MCSA/MCSE 2003 JumpStart

This unique book provides aspiring Microsoft professionals with a solid foundation in computer, networking, and operating systems fundamentals before embarking on a comprehensive MCSA or MCSE study program.


MCSA/MCSE 2003 JumpStart: Computer and Network Basics gives you the solid grounding you need to approach...


Assessment of Aphasia
Assessment of Aphasia
This book is addressed to the practicing speech clinician and neuropsychologist dealing with aphasic adults and children, as well as with children who have delayed or disordered language development. It is also written as a primary or ancillary text in graduate courses dealing with the assessment of speech and language problems. To...
Linear Systems (Control Systems, Robotics and Manufacturing)
Linear Systems (Control Systems, Robotics and Manufacturing)

Linear systems have all the necessary elements (modeling, identification, analysis and control), from an educational point of view, to help us understand the discipline of automation and apply it efficiently. This book is progressive and organized in such a way that different levels of readership are possible. It is addressed both to...

Managing Psychological Factors in Information Systems Work: An Orientation to Emotional Intelligence
Managing Psychological Factors in Information Systems Work: An Orientation to Emotional Intelligence
With the expansion of the Internet and the resulting globalization of business activity, the scope of the influence of information technology (IT) has increased significantly. Many innovative business practices are being enabled by IT. The capacity for integration of information in numeric, text, voice, and video form will give...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy