Table of contents:
- Acknowledgments
- Secure Communication in Modern Information Societies
- Electronic Commerce: The Mantra of Y2K+
- Cryptographic Systems
- Legislating Electronic Authentication
- The Mathematical Judge
- Encryption Policies
- Trust and Communities
- Bibliographic Notes
- Public-Key Cryptography
- Specification of RSA
- A Realization of PKCs: RSA
- Generating Large Primes
- Correctness of RSA
- Security of RSA
- Integer Factorization
- Other Key-Exchange Realizations Based on Discrete Logarithms
- Bibliographic Notes
- Symmetric-Key Cryptography
- Stream Ciphers
- Block Ciphers
- Bibliographic Notes
- Security Protocol Design and Analysis
- Digital signatures
- Secure Log-in Protocols
- Authentication Revisited
- Secret-Sharing Protocols
- Model Checking Security Protocol Designs
- Bibliographic Notes
- Optimal public-key encryption with RSA
- A Simple Semantically Secure Encryption
- A Plain-Text-Aware Encryption
- The Random Oracle Methodology
- Exact Security for the Simple Encryption
- Exact Security for the Plain-Text-Aware Encryption
- Bibliographic Notes
- Analysis of Secure Information Flow
- Motivation
- A Type System for Analysis of Secure Information Flow
- A Semantic Approach to Analysis of Secure Information Flow
- Program Certification
- Covert Channels
- Bibliographic Notes
- Appendix Primitive Roots
- Existence of Primitive Roots
- Computing Primitive Roots
- Bibliography
- Index