1.3 SUBSTITUTION CIPHERS AND TRANSPOSITION CIPHERS
PART I CRYPTOGRAPHIC PROTOCOLS
2.2 COMMUNICATIONS USING SYMMETRIC CRYPTOGRAPHY
2.5 COMMUNICATIONS USING PUBLIC-KEY CRYPTOGRAPHY
2.7 DIGITAL SIGNATURES WITH ENCRYPTION
2.8 RANDOM AND PSEUDO-RANDOM-SEQUENCE GENERATION
3.3 AUTHENTICATION AND KEY EXCHANGE
3.4 FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE PROTOCOLS
3.5 MULTIPLE-KEY PUBLIC-KEY CRYPTOGRAPHY
3.8 CRYPTOGRAPHIC PROTECTION OF DATABASES
4.3 UNDENIABLE DIGITAL SIGNATURES
4.4 DESIGNATED CONFIRMER SIGNATURES
4.7 FAIL-STOP DIGITAL SIGNATURES
4.8 COMPUTING WITH ENCRYPTED DATA
4.13 ALL-OR-NOTHING DISCLOSURE OF SECRETS
5.2 ZERO-KNOWLEDGE PROOFS OF IDENTITY
5.4 IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY
5.7 SIMULTANEOUS CONTRACT SIGNING
5.9 SIMULTANEOUS EXCHANGE OF SECRETS
6.2 SECURE MULTIPARTY COMPUTATION
6.3 ANONYMOUS MESSAGE BROADCAST
PART II CRYPTOGRAPHIC TECHNIQUES
7.3 COMPARING SYMMETRIC AND PUBLIC-KEY KEY LENGTH
7.4 BIRTHDAY ATTACKS AGAINST ONE-WAY HASH FUNCTIONS
8.12 PUBLIC-KEY KEY MANAGEMENT
9.3 CIPHER BLOCK CHAINING MODE
9.5 SELF-SYNCHRONIZING STREAM CIPHERS
9.7 SYNCHRONOUS STREAM CIPHERS
9.13 BLOCK CIPHERS VERSUS STREAM CIPHERS
10.2 PUBLIC-KEY CRYPTOGRAPHY VERSUS SYMMETRIC CRYPTOGRAPHY
10.3 ENCRYPTING COMMUNICATIONS CHANNELS
10.4 ENCRYPTING DATA FOR STORAGE
10.5 HARDWARE ENCRYPTION VERSUS SOFTWARE ENCRYPTION
10.6 COMPRESSION, ENCODING, AND ENCRYPTION
10.8 HIDING CIPHERTEXT IN CIPHERTEXT
PART III CRYPTOGRAPHIC ALGORITHMS
11.6 DISCRETE LOGARITHMS IN A FINITE FIELD
12 DATA ENCRYPTION STANDARD (DES)
12.4 DIFFERENTIAL AND LINEAR CRYPTANALYSIS
14.10 THEORY OF BLOCK CIPHER DESIGN
14.11 USING ONE-WAY HASH FUNCTIONS
14.12 CHOOSING A BLOCK ALGORITHM
15.3 DOUBLING THE BLOCK LENGTH
15.4 OTHER MULTIPLE ENCRYPTION SCHEMES
15.7 CASCADING MULTIPLE BLOCK ALGORITHMS
15.8 COMBINING MULTIPLE BLOCK ALGORITHMS
16 PSEUDO-RANDOM-SEQUENCE GENERATORS AND STREAM CIPHERS
16.1 LINEAR CONGRUENTIAL GENERATORS
16.2 LINEAR FEEDBACK SHIFT REGISTERS
16.3 DESIGN AND ANALYSIS OF STREAM CIPHERS
16.4 STREAM CIPHERS USING LFSRS
17 OTHER STREAM CIPHERS AND REAL RANDOM-SEQUENCE GENERATORS
17.4 FEEDBACK WITH CARRY SHIFT REGISTERS
17.5 STREAM CIPHERS USING FCSRS
17.6 NONLINEAR-FEEDBACK SHIFT REGISTERS
17.8 SYSTEM-THEORETIC APPROACH TO STREAM-CIPHER DESIGN
17.9 COMPLEXITY-THEMATIC APPROACH TO STREAM-CIPHER DESIGN
17.10 OTHER APPROACHES TO STREAM-CIPHER DESIGN
17.11 CASCADING MULTIPLE STREAM CIPHERS
17.12 CHOOSING A STREAM CIPHER
17.13 GENERATING MULTIPLE STREAMS FROM A SINGLE PSEUDO-RANDOM-SEQUENCE GENERATOR
17.14 REAL RANDOM-SEQUENCE GENERATORS
18.7 SECURE HASH ALGORITHM (SHA)
18.10 OTHER ONE-WAY HASH FUNCTIONS
18.11 ONE-WAY HASH FUNCTIONS USING SYMMETRIC BLOCK ALGORITHMS
18.12 USING PUBLIC-KEY ALGORITHMS
18.13 CHOOSING A ONE-WAY HASH FUNCTION
18.14 MESSAGE AUTHENTICATION CODES
19.8 ELLIPTIC CURVE CRYPTOSYSTEMS
19.10 FINITE AUTOMATON PUBLIC-KEY CRYPTOSYSTEMS
20 PUBLIC-KEY DIGITAL SIGNATURE ALGORITHMS
20.1 DIGITAL SIGNATURE ALGORITHM (DSA)
20.3 GOST DIGITAL SIGNATURE ALGORITHM
20.4 DISCRETE LOGARITHM SIGNATURE SCHEMES
20.8 OTHER PUBLIC-KEY ALGORITHMS
21.4 CONVERTING IDENTIFICATION SCHEMES TO SIGNATURE SCHEMES
22.2 STATION-TO-STATION PROTOCOL
22.3 SHAMIR'S THREE-PASS PROTOCOL
22.6 FORTIFIED KEY NEGOTIATION
22.7 CONFERENCE KEY DISTRIBUTION AND SECRET BROADCASTING
23 SPECIAL ALGORITHMS FOR PROTOCOLS
23.1 MULTIPLE-KEY PUBLIC-KEY CRYPTOGRAPHY
23.2 SECRET-SHARING ALGORITHMS
23.4 UNDENIABLE DIGITAL SIGNATURES
23.5 DESIGNATED CONFIRMER SIGNATURES
23.6 COMPUTING WITH ENCRYPTED DATA
23.9 ALL-OR-NOTHING DISCLOSURE OF SECRETS
23.10 FAIR AND FAILSAFE CRYPTOSYSTEMS
23.11 ZERO-KNOWLEDGE PROOFS OF KNOWLEDGE
23.14 SECURE MULTIPARTY COMPUTATION
23.15 PROBABILISTIC ENCRYPTION
24.1 IBM SECRET-KEY MANAGEMENT PROTOCOL
24.8 IBM COMMON CRYPTOGRAPHIC ARCHITECTURE
24.9 ISO AUTHENTICATION FRAMEWORK
24.10 PRIVACY-ENHANCED MAIL (PEM)
24.11 MESSAGE SECURITY PROTOCOL (MSP)
24.12 PRETTY GOOD PRIVACY (PGP)
24.14 PUBLIC-KEY CRYPTOGRAPHY STANDARDS (PKCS)
24.15 UNIVERSAL ELECTRONIC PAYMENT SYSTEM (UEPS)
24.18 AT&T MODEL 3600 TELEPHONE SECURITY DEVICE (TSD)
25.1 NATIONAL SECURITY AGENCY (NSA)
25.2 NATIONAL COMPUTER SECURITY CENTER (NCSC)
25.3 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST)
25.6 INTERNATIONAL ASSOCIATION FOR CRYPTOGRAPHIC RESEARCH (IACR)
25.7 RACE INTEGRITY PRIMITIVES EVALUATION (RIPE)
25.8 CONDITIONAL ACCESS FOR EUROPE (CAFE)
25.10 PROFESSIONAL, CIVIL LIBERTIES, AND INDUSTRY GROUPS
3.144.17.91