《密码编码学与网络安全——原理与实践》学习笔记.zip

上传者: SherryJin | 上传时间: 2025-11-14 12:47:20 | 文件大小: 19KB | 文件类型: ZIP
《密码编码学与网络安全——原理与实践》学习笔记.zip

文件下载

资源详情

[{"title":"( 37 个子文件 19KB ) 《密码编码学与网络安全——原理与实践》学习笔记.zip","children":[{"title":"CryptographyNotes-master","children":[{"title":"第3部分-公钥密码","children":[{"title":"第9章-公钥密码学与RSA","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第10章-密钥管理和其他公钥密码体制","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第7部分-系统安全","children":[{"title":"第21章-恶意软件","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第23章-防火墙","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第22章-入侵者","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"LICENSE <span style='color:#111;'> 1.04KB </span>","children":null,"spread":false},{"title":"第4部分-密码学中的数据完整性算法","children":[{"title":"第13章-数字签名","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第11章-密码学Hash函数","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第12章-消息认证码","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"附录","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第8部分-法律与道德","children":[{"title":"第24章-法律与道德","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第1部分-概览","children":[{"title":"第2章-数论基础","children":[{"title":"src","children":[{"title":"Miller_Rabin.cpp <span style='color:#111;'> 1.45KB </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第1章-计算机与网络安全概念","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第2部分-对称密码","children":[{"title":"第4章-分组密码和数据加密标准","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第7章-分组密码的工作模式","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第3章-传统加密技术","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第5章-有限域","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第8章-伪随机数的产生和流密码","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false},{"title":"第6章-高级加密标准(AES)","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":false}],"spread":true},{"title":".gitignore <span style='color:#111;'> 270B </span>","children":null,"spread":false},{"title":"第5部分-互信","children":[{"title":"第14章-密钥管理和分发","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第15章-用户认证","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 1.49KB </span>","children":null,"spread":false},{"title":"第6部分-网络与Internet安全","children":[{"title":"第19章-电子邮件安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第17章-传输层安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":false},{"title":"第18章-无线网络安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":false},{"title":"第20章-IP安全性","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":false},{"title":"第16章-网络访问控制和云安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":false},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true}],"spread":false}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明