Читать книгу Information Security - Mark Stamp - Страница 3

List of Tables

Оглавление

1 Chapter 2Table 2.1 Abbreviated alphabetTable 2.2 Election of 1876 codebookTable 2.3 Excerpt from a German codebookTable 2.4VENONA decrypt of message of 21 September 1944

2 Chapter 3Table 3.1 RC4 initializationTable 3.2 RC4 keystream byteTable 3.3 DES S‐box 1 (in hexadecimal)Table 3.4 DES key schedule algorithmTable 3.5 AES ByteSub Table 3.6 TEA encryptionTable 3.7 TEA decryption

3 Chapter 4Table 4.1 Addition on an elliptic curve

4 Chapter 5Table 5.1 Steps in round of SHA‐3Table 5.2 Simple steganography example

5 Chapter 6Table 6.1 Iris scan distance and fraud rateTable 6.2 Biometric equal error rates [121]

6 Chapter 7Table 7.1 Access control matrixTable 7.2 Access control matrix for confused deputy example

7 Chapter 8Table 8.1 Spoofed email in SMTPTable 8.2 Example ACLTable 8.3 Aliceś initial file access ratesTable 8.4 Aliceś recent file access ratesTable 8.5 Aliceś updated file access ratesTable 8.6 Aliceś more recent file access ratesTable 8.7 Aliceś second updated access rates

8 Chapter 11Table 11.1 Approximate lines of codeTable 11.2 A flawed programTable 11.3 Code exampleTable 11.4 Disassembled serial number programTable 11.5 Source code for serial number exampleTable 11.6 Serial number program

9 Chapter 12Table 12.1 Example Java programTable 12.2 Decompiled Java programTable 12.3 Serial number program disassemblyTable 12.4 Hex view of serial.exe Table 12.5 Hex view of original and patchedTable 12.6 Disassembly of patched serial number program

Information Security

Подняться наверх