... input, independent of the length of x. Additionalsuggestionsfor achievingMAC-likefunctionalityby combiningMDCs and encryption are discussed in §9.6.5. Handbook of Applied Cryptography by A. ... that weaknessesof the underlying hash function become known. Algorithm 9.69 is such a tech- nique,constructedusingMD5. It providesperformanceclose to that of MD5(5-20%slower in software...
Ngày tải lên: 17/10/2013, 16:15
... particular, Feige, Fiat, and Shamir[383] adapted the conceptsof interactiveproofs of membershipto interactiveproofs Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone. § 10.2 ... proofs were formalized in 1985 by Gold- wasser, Micali, and Rackoff [481] in the context of an interactive proof of membership of a string x in a language L; they showed t...
Ngày tải lên: 20/10/2013, 03:15
Handbook of Applied Cryptography - chap11
... 11.64) if step 2b were ignored. Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone. This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. ... message recovery refers to the ratio of the logarithm(base2) of the size of the signingspaceM S to the logarithm (base 2) of the size of M R , the image space of the redund...
Ngày tải lên: 20/10/2013, 03:15
Handbook of Applied Cryptography - chap12
... 9 (Definition 9.76), and is quite distinct. Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone. This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. ... more precise statement of Fact 12.79 requires con- sideration of entropy; the statement holds if the conference keys in question have m bits of entropy. Handbook of...
Ngày tải lên: 24/10/2013, 01:15
Handbook of Applied Cryptography - chap13
... original verification of the notary establishes existence of a trust chain at that point in time, and subsequently its record thereof serves as proof of prior validity. It may be of interest (for ... to record the details of the original trust chain. 5 More generally, the truth of the appended statement must be accepted, relative to the timestamp. Handbook of Applied Cryptog...
Ngày tải lên: 28/10/2013, 09:15
Handbook of Applied Cryptography - chap15
... transfer of a message from an originator to a recipient. Mechanisms are specified for non-repudiation of origin (denial of being the originator of a message), non-repudiation of delivery (denial of ... introduced Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone. 658 Ch.15 Patents and Standards the concept of a digital signature as well as pu...
Ngày tải lên: 28/10/2013, 09:15
Handbook of Applied Cryptography - chap14
... reduce the number of multiplications used to compute g e . Ideally, one would do both. This section considers three types of exponentiation algorithms. Handbook of Applied Cryptography by A. ... follows that x ≡ s i=0 r i (mod m). Hence, repeated subtraction of m from r = s i=0 r i gives the correct residue. Handbook of Applied Cryptography by A. Menezes, P. van Oors...
Ngày tải lên: 06/11/2013, 23:15
Handbook of Applied cryptography
... Shoup [1224], as well as Kaltofen and Shoup [658]. Table of Contents List of Tables xv List of Figures xix Foreword by R.L. Rivest xxi Preface xxiii 1 Overview of Cryptography 1 1.1 Introduction ::::::: ... factoring algorithm (ECA) of §3.2.4 was invented by Lenstra [756]. Montgomery [894] gave several practical improvements to the ECA. Silverman and HANDBOOK of APPLIED...
Ngày tải lên: 14/12/2013, 00:22
Tài liệu Handbook of Applied Cryptography - chap1 ppt
... abstract concepts of this section in mind as concrete methods are presented. Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone. 10 Ch. 1 Overview of Cryptography 1.3.2 ... subset of C. Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone. 12 Ch. 1 Overview of Cryptography • An encryption scheme consists of...
Ngày tải lên: 26/01/2014, 00:20