RSA Securitys Official Guide to Cryptography
Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security--the most trusted name in e-security(tm). Part of the RSA Press Series.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Security Provided by Computer Operating Systems
201 other sections not shown
Other editions - View all
algorithm application authentication BER encoding biometric bits block cipher brute force brute-force attack bulk data bytes cardholder certificate Chapter ciphertext client components contents octets create crypto cryptographic Daniel decrypt defined device Diffie-Hellman digital envelope digital signature e-mail ECDSA electronic encrypt data end users example ff ff ff Figure Gwen Gwen's HMAC implement Internet IPSec key exchange key pair key recovery key size merchant message digest mode modulus nonrepudiation OBJECT IDENTIFIER OCTET STRING operations optional Pao-Chi parameters password PKCS plaintext private key PRNG produce protect protocol pseudo-random public key random relying parties RSA Security S/MIME Satomi secret Section seed SEQUENCE server session key signed smart card someone standard stream cipher symmetric symmetric-key tion token trust verify Version
All Book Search results »
Proceedings of the 3rd European Conference on Information Warfare and ...
No preview available - 2004