ÇöÀçÀ§Ä¡ : Home > ÄÄÇ»ÅÍ/ÀÎÅÍ³Ý > µ¥ÀÌÅͺ£À̽º ±¸Ãà / °ü¸®

 
Applied Cryptography: Protocols, Algorithms, and Source Code in C (Paperback, 2nd)
    ¡¤ ÁöÀºÀÌ | ¿Å±äÀÌ:Applied Cryptography: Protocols, Algorithms, and S
    ¡¤ ÃâÆÇ»ç:John Wiley & Sons Inc
    ¡¤ ÃâÆdz⵵:2000
    ¡¤ Ã¥»óÅÂ:º»¹® Ãø¸éÀÇ ÀÛÀº ¿µ¹® À̸§ Á÷ÀÎ ¿Ü¿£ ³«¼­¾ø´Â »ó±Þ / 792ÂÊ | 234*183mm | ¾ð¾î : English | ±¹°¡ : ¹Ì±¹ | 1338g | ISBN : 9780471117094(0471117099)
    ¡¤ ISBN:0471117099
    ¡¤ ½ÃÁß°¡°Ý : ¿ø
    ¡¤ ÆǸŰ¡°Ý : ¿ø
    ¡¤ Æ÷ ÀÎ Æ® : Á¡
    ¡¤ ¼ö ·® : °³

Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code. Original. (Advanced).


Partial table of contents:

 CRYPTOGRAPHIC PROTOCOLS.

 Protocol Building Blocks.

 Basic Protocols.

 Intermediate Protocols.

 Advanced Protocols.

 Esoteric Protocols.

 CRYPTOGRAPHIC TECHNIQUES.

 Key Length.

 Key Management.

 Algorithm Types and Modes.

 Using Algorithms.

 CRYPTOGRAPHIC ALGORITHMS.

 Data Encryption Standard (DES).

 Other Block Ciphers.

 Other Stream Ciphers and Real Random-Sequence Generators.

 Public-Key Algorithms.

 Special Algorithms for Protocols.

 THE REAL WORLD.

 Example Implementations.

 Politics.

 SOURCE CODE.source Code.

 References.


¹øÈ£ Á¦¸ñ ÀÛ¼ºÀÚ ÀÛ¼ºÀÏ ´äº¯
ÀÌ »óÇ°¿¡ ´ëÇÑ Áú¹®ÀÌ ¾ÆÁ÷ ¾ø½À´Ï´Ù.
±Ã±ÝÇϽŠ»çÇ×Àº ÀÌ°÷¿¡ Áú¹®ÇÏ¿© ÁֽʽÿÀ.
 
* ÀÌ »óÇ°¿¡ ´ëÇÑ ±Ã±ÝÇÑ »çÇ×ÀÌ ÀÖÀ¸½Å ºÐÀº Áú¹®ÇØ ÁֽʽÿÀ.
ȸ»ç¼Ò°³ | ¼­ºñ½ºÀÌ¿ë¾à°ü | °³ÀÎÁ¤º¸ Ãë±Þ¹æħ
¼­¿ï½Ã °ü¾Ç±¸ Çà¿îµ¿ 1686-21 È£Àüºôµù ÁöÇÏ1Ãþ (ÁöÇÏö2È£¼± ³«¼º´ë¿ª 5,6¹ø Ãⱸ »çÀÌ) / ÀüÈ­ : 02-811-1256 / Æѽº : 02-811-1256 / ¿î¿µÀÚ : ´Þ¸¶ / °³ÀÎÁ¤º¸°ü¸®Ã¥ÀÓÀÚ : ÀÓ¿µÅÃ
»ç¾÷ÀÚ µî·Ï¹øÈ£ : 108-91-53191 / ´ëÇ¥ : ÀÓ¿µÅà / Åë½ÅÆǸž÷½Å°í¹øÈ£ : Á¦ OO±¸ - 123È£
Copyright © 2009 ´Þ¸¶¼­Á¡. All Rights Reserved.