Table of Contents for
Malicious Cryptography: Exposing Cryptovirology
Close
Version ebook
/
Retour
Malicious Cryptography: Exposing Cryptovirology
by Moti Yung
Published by John Wiley & Sons, 2004
Cover Page
Title Page
Copyright
Dedication
Contents
Foreword
Acknowledgments
Introduction
Chapter 1: Through Hacker's Eyes
Chapter 2: Cryptovirology
Chapter 3: Tools for Security and Insecurity
Chapter 4: The Two Faces of Anonymity
Chapter 5: Cryptocounters
Chapter 6: Computationally Secure Information Stealing
Chapter 7: Non-Zero Sum Games and Survivable Malware
Chapter 8: Coping with Malicious Software
Chapter 9: The Nature of Trojan Horses
Chapter 10: Subliminal Channels
Chapter 11: SETUP Attack on Factoring Based Key Generation
Chapter 12: SETUP Attacks on Discrete-Log Cryptosystems
Appendix A: Computer Virus Basics
Appendix B: Notation and Other Background Information
Appendix C: Public Key Cryptography in a Nutshell
Glossary
References
Index
Next
Next Chapter
Title Page
Next
Next Chapter
Title Page