Malicious cryptography exposing cryptovirology
Annotation
Main Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Indianapolis, Indiana
Wiley Publishing
2004
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Through hacker's eyes
- Cryptovirology
- Tools for security and insecurity
- The two faces of anonymity
- Cryptocounters
- Computationally secure information stealing
- Non-zero sum games and survivable malware
- Coping with malicious software
- The nature of Trojan horses
- Subliminal channels
- SETUP attack on factoring based key generation
- SETUP attacks on discrete-log cryptosystems
- Includes bibliographical references and index