Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- (r, β)-Bell polynomials 1
- Bell polynomials 1
- Bernoulli polynomials 1
- Colebrook equation 1
- Colebrook–White experiment 1
- Cryptography 1
- Euler polynomials 1
- Euler totient function 1
- Fubini polynomials 1
- Hermite Kampé de Fériet polynomials 1
- Hermite polynomials 1
- Konhauser matrix polynomial 1
- Mathematics & science 1
- Möbius function 1
- Padé polynomials 1
- Research & information: general 1
- Stirling numbers 1
- Stirling numbers of the second kind 1
- approximations 1
- degenerate Bernstein operators 1
- degenerate Bernstein polynomials 1
- degenerate Euler polynomials 1
- degenerate Fubini polynomials 1
- difference-differential operator 1
- differential equations 1
- differential equations, heat equation 1
- divisor functions 1
- floating-point computations 1
- fractional Choquard equation 1
- fractional integral 1
-
1
-
2Publicado 2023Tabla de Contenidos: “…Authorization and authenticated key establishment -- Message authentication versus entity authentication -- Password-based authentication -- Brief history of password-based authentication -- Storing passwords -- Disadvantages of password-based authentication -- Challenge-response protocols -- Ensuring freshness -- Challenge-response using symmetric keys -- Challenge-response using (keyed) one-way functions -- Challenge-response using public-key cryptography -- Summary -- Chapter 6: Transport Layer Security at a Glance -- Birth of the World Wide Web -- Early web browsers -- From SSL to TLS -- TLS overview -- TLS terminology -- CIA triad in TLS -- TLS within the internet protocol stack -- TLS version 1.2 -- Subprotocols in TLS version 1.2 -- A typical TLS 1.2 connection -- Algorithm negotiation -- Key establishment -- Server authentication -- Client authentication -- Session resumption -- TLS version 1.3 -- Handshake protocol -- Error handling in the TLS 1.3 handshake -- Session resumption and PSKs -- Zero round-trip time mode -- Major differences between TLS versions 1.3 and 1.2 -- Summary -- Part 2: Shaking Hands -- Chapter 7: Public-Key Cryptography -- Preliminaries -- Groups -- Examples of groups -- The discrete logarithm problem -- The Diffie-Hellman key-exchange protocol -- Security of Diffie-Hellman key exchange -- Discrete logarithm problem -- The Diffie-Hellman problem -- Authenticity of public keys -- The ElGamal encryption scheme -- Finite fields -- Fields of order p -- Fields of order pk -- The RSA algorithm -- Euler's totient function -- Key pair generation -- The encryption function -- The decryption function -- Security of the RSA algorithm -- The factoring problem -- The RSA problem -- Authenticity of public keys -- Authenticated key agreement -- The Station-to-Station (STS) protocol -- Public-key cryptography in TLS 1.3.…”
Libro electrónico