Mostrando 1 - 2 Resultados de 2 Para Buscar '"totient"', tiempo de consulta: 0.03s Limitar resultados
  1. 1
    Publicado 2020
    Materias:
    Libro electrónico
  2. 2
    Publicado 2023
    Tabla de Contenidos: “…Authorization and authenticated key establishment -- Message authentication versus entity authentication -- Password-based authentication -- Brief history of password-based authentication -- Storing passwords -- Disadvantages of password-based authentication -- Challenge-response protocols -- Ensuring freshness -- Challenge-response using symmetric keys -- Challenge-response using (keyed) one-way functions -- Challenge-response using public-key cryptography -- Summary -- Chapter 6: Transport Layer Security at a Glance -- Birth of the World Wide Web -- Early web browsers -- From SSL to TLS -- TLS overview -- TLS terminology -- CIA triad in TLS -- TLS within the internet protocol stack -- TLS version 1.2 -- Subprotocols in TLS version 1.2 -- A typical TLS 1.2 connection -- Algorithm negotiation -- Key establishment -- Server authentication -- Client authentication -- Session resumption -- TLS version 1.3 -- Handshake protocol -- Error handling in the TLS 1.3 handshake -- Session resumption and PSKs -- Zero round-trip time mode -- Major differences between TLS versions 1.3 and 1.2 -- Summary -- Part 2: Shaking Hands -- Chapter 7: Public-Key Cryptography -- Preliminaries -- Groups -- Examples of groups -- The discrete logarithm problem -- The Diffie-Hellman key-exchange protocol -- Security of Diffie-Hellman key exchange -- Discrete logarithm problem -- The Diffie-Hellman problem -- Authenticity of public keys -- The ElGamal encryption scheme -- Finite fields -- Fields of order p -- Fields of order pk -- The RSA algorithm -- Euler's totient function -- Key pair generation -- The encryption function -- The decryption function -- Security of the RSA algorithm -- The factoring problem -- The RSA problem -- Authenticity of public keys -- Authenticated key agreement -- The Station-to-Station (STS) protocol -- Public-key cryptography in TLS 1.3.…”
    Libro electrónico