[{"title":"( 38 个子文件 21KB ) 一个“轻松”的《密码编码学与网络安全——原理与实践》学习笔记.zip","children":[{"title":"EasyCryptographyNotes-master","children":[{"title":"0x6第6部分-网络与Internet安全","children":[{"title":"第19章-电子邮件安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第17章-传输层安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第18章-无线网络安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第20章-IP安全性","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第16章-网络访问控制和云安全","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"0x1第1部分-概览","children":[{"title":"1x1第1章-计算机与网络安全概念","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":".DS_Store <span style='color:#111;'> 6.00KB </span>","children":null,"spread":false},{"title":"1x2第2章-数论基础","children":[{"title":"src","children":[{"title":"Miller_Rabin.cpp <span style='color:#111;'> 1.45KB </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":".gitattributes <span style='color:#111;'> 66B </span>","children":null,"spread":false},{"title":"LICENSE <span style='color:#111;'> 1.04KB </span>","children":null,"spread":false},{"title":"0x2第2部分-对称密码","children":[{"title":"第4章-分组密码和数据加密标准","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第7章-分组密码的工作模式","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第3章-传统加密技术","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第5章-有限域","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第8章-伪随机数的产生和流密码","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false},{"title":"第6章-高级加密标准(AES)","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"0x7第7部分-系统安全","children":[{"title":"第21章-恶意软件","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第23章-防火墙","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第22章-入侵者","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"0x4第4部分-密码学中的数据完整性算法","children":[{"title":"第13章-数字签名","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第11章-密码学Hash函数","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第12章-消息认证码","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"0x3第3部分-公钥密码","children":[{"title":"第9章-公钥密码学与RSA","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第10章-密钥管理和其他公钥密码体制","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"0x8第8部分-法律与道德","children":[{"title":"第24章-法律与道德","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"0x9附录","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 1.43KB </span>","children":null,"spread":false},{"title":"0x5第5部分-互信","children":[{"title":"第14章-密钥管理和分发","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true},{"title":"第15章-用户认证","children":[{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":false},{"title":"README.md <span style='color:#111;'> 0B </span>","children":null,"spread":false}],"spread":true}],"spread":false}],"spread":true}]