Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Half title page Title page Copyright page Dedication PREFACE Part I: MATHEMATICAL PRELIMINARIES
CHAPTER 1 Counting
1.1 THE SUM AND PRODUCT RULES 1.2 MATHEMATICAL INDUCTION 1.3 FACTORIAL 1.4 BINOMIAL COEFFICIENTS 1.5 MULTINOMIAL COEFFICIENTS 1.6 PERMUTATIONS 1.7 COMBINATIONS 1.8 THE PRINCIPLE OF INCLUSION-EXCLUSION 1.9 PARTITIONS 1.10 RELATIONS 1.11 INVERSE RELATIONS APPENDIX 1 Summations Involving Binomial Coefficients
CHAPTER 2 Recurrence and Generating Functions
2.1 RECURSIONS 2.2 GENERATING FUNCTIONS 2.3 LINEAR CONSTANT COEFFICIENT RECURSIONS 2.4 SOLVING HOMOGENEOUS LCCRS USING GENERATING FUNCTIONS 2.5 THE CATALAN RECURSION 2.6 THE UMBRAL CALCULUS4 2.7 EXPONENTIAL GENERATING FUNCTIONS 2.8 PARTITIONS OF A SET: THE BELL AND STIRLING NUMBERS 2.9 ROUCHÉ’S THEOREM AND THE LAGRANGE’S INVERSION FORMULA
CHAPTER 3 Asymptotic Analysis
3.1 GROWTH NOTATION FOR SEQUENCES 3.2 ASYMPTOTIC SEQUENCES AND EXPANSIONS 3.3 SADDLE POINTS 3.4 LAPLACE’S METHOD 3.5 THE SADDLE POINT METHOD 3.6 WHEN WILL THE SADDLE POINT METHOD WORK? 3.7 SADDLE POINT BOUNDS 3.8 EXAMPLES OF SADDLE POINT ANALYSIS
CHAPTER 4 Discrete Probability Theory
4.1 THE ORIGINS OF PROBABILITY THEORY 4.2 CHANCE EXPERIMENTS, SAMPLE POINTS, SPACES, AND EVENTS 4.3 RANDOM VARIABLES 4.4 MOMENTS—EXPECTATION AND VARIANCE 4.5 THE BIRTHDAY PARADOX1 4.6 CONDITIONAL PROBABILITY AND INDEPENDENCE 4.7 THE LAW OF LARGE NUMBERS (LLN) 4.8 THE CENTRAL LIMIT THEOREM (CLT) 4.9 RANDOM PROCESSES AND MARKOV CHAINS
CHAPTER 5 Number Theory and Modern Algebra
5.1 PRIME NUMBERS 5.2 MODULAR ARITHMETIC AND THE EUCLIDEAN ALGORITHM 5.3 MODULAR MULTIPLICATION 5.4 THE THEOREMS OF FERMAT2 AND EULER 5.5 FIELDS AND EXTENSION FIELDS 5.6 FACTORIZATION OF INTEGERS 5.7 TESTING PRIMALITY
CHAPTER 6 Basic Concepts of Cryptography
6.1 THE LEXICON OF CRYPTOGRAPHY 6.2 STREAM CIPHERS 6.3 BLOCK CIPHERS 6.4 SECRECY SYSTEMS AND CRYPTANALYSIS 6.5 SYMMETRIC AND TWO-KEY CRYPTOGRAPHIC SYSTEMS 6.6 THE APPEARANCE OF PUBLIC KEY CRYPTOGRAPHIC SYSTEMS 6.7 A MULTITUDE OF KEYS 6.8 THE RSA CRYPTOSYSTEM 6.9 DOES PKC SOLVE THE PROBLEM OF KEY DISTRIBUTION? 6.10 ELLIPTIC GROUPS OVER THE REALS 6.11 ELLIPTIC GROUPS OVER THE FIELD Zm,2 6.12 ELLIPTIC GROUPS CRYPTOSYSTEMS 6.13 THE MENEZES-VANSTONE ELLIPTIC CURVE CRYPTOSYSTEM 6.14 SUPER SINGULAR ELLIPTIC CURVES
Part II: HASHING FOR STORAGE: DATA MANAGEMENT
CHAPTER 7 Basic Concepts
7.1 OVERVIEW OF THE RECORDS MANAGEMENT PROBLEM 7.2 A SIMPLE STORAGE MANAGEMENT PROTOCOL: PLAIN VANILLA CHAINING 7.3 RECORD-MANAGEMENT WITH SORTED KEYS
CHAPTER 8 Hash Functions
8.1 THE ORIGIN OF HASHING 8.2 HASH TABLES 8.3 A STATISTICAL MODEL FOR HASHING 8.4 THE LIKELIHOOD OF COLLISIONS
CHAPTER 9 Hashing Functions: Examples and Evaluation
9.1 OVERVIEW: THE TRADEOFF OF RANDOMIZATION VERSUS COMPUTATIONAL SIMPLICITY 9.2 SOME EXAMPLES OF HASHING FUNCTIONS 9.3 PERFORMANCE OF HASHING FUNCTIONS: FORMULATION 9.4 THE χ2-TEST 9.5 TESTING A HASH FUNCTION 9.6 THE MCKENZIE ET AL. RESULTS
CHAPTER 10 Record Chaining with Hash Tables
10.1 SEPARATE CHAINING OF RECORDS 10.2 ANALYSIS OF SEPARATE CHAINING HASHING SEQUENCES AND THE CHAINS THEY CREATE 10.3 A COMBINATORIAL ANALYSIS OF SEPARATE CHAINING 10.4 COALESCED CHAINING 10.5 THE PITTEL-YU ANALYSIS OF EICH COALESCED CHAINING 10.6 TO SEPARATE OR TO COALESCE; AND WHICH VERSION? THAT IS THE QUESTION
CHAPTER 11 Perfect Hashing
11.1 OVERVIEW 11.2 CICHELLI’S CONSTRUCTION
CHAPTER 12 The Uniform Hashing Model
12.1 AN IDEALIZED HASHING MODEL 12.2 THE ASYMPTOTICS OF UNIFORM HASHING 12.3 COLLISION-FREE HASHING
CHAPTER 13 Hashing with Linear Probing
13.1 FORMULATION AND PRELIMINARIES 13.2 PERFORMANCE MEASURES FOR LP HASHING 13.3 ALL CELLS OTHER THAN HTn−1 IN THE HASH-TABLE OF n CELLS ARE OCCUPIED 13.4 m-KEYS HASHED INTO A HASH TABLE OF n CELLS LEAVING CELL HTn−1 UNOCCUPIED 13.5 THE PROBABILITY DISTRIBUTION FOR THE LENGTH OF A SEARCH 13.6 ASYMPTOTICS 13.7 HASHING WITH LINEAR OPEN ADDRESSING: CODA 13.8 A POSSIBLE IMPROVEMENT TO LINEAR PROBING
CHAPTER 14 Double Hashing
14.1 FORMULATION OF DOUBLE HASHING1 14.2 PROGRESSIONS AND STRIDES 14.3 THE NUMBER OF PROGRESSIONS WHICH FILL A HASH-TABLE CELL 14.4 DOMINANCE 14.5 INSERTION-COST BOUNDS RELATING UNIFORM AND DOUBLE HASHING 14.6 USUALLYDOUBLEHASH 14.7 THE UDH CHANCE EXPERIMENT AND THE COST TO INSERT THE NEXT KEY BY DOUBLE HASHING 14.8 PROOF OF EQUATION (14.12a) 14.9 USUALLYDOUBLEHASH′ 14.10 PROOF OF EQUATION (14.12b)
CHAPTER 15 Optimum Hashing
15.1 THE ULLMAN–YAO FRAMEWORK1 15.2 THE RATES AT WHICH A CELL IS PROBED AND OCCUPIED 15.3 PARTITIONS OF (i)SCENARIOS, (i)SUBSCENARIOS, AND THEIR SKELETONS 15.4 RANDOMLY GENERATED m-SCENARIOS 15.5 BOUNDS ON RANDOM SUMS 15.6 COMPLETING THE PROOF OF THEOREM 15.1
Part III: SOME NOVEL APPLICATIONS OF HASHING
CHAPTER 16 Karp-Rabin String Searching
16.1 OVERVIEW 16.2 THE BASIC KARP-RABIN HASH-FINGERPRINT ALGORITHM 16.3 THE PLAIN VANILLA KARP-RABIN FINGERPRINT ALGORITHM 16.4 SOME ESTIMATES ON PRIME NUMBERS 16.5 THE COST OF FALSE MATCHES IN THE PLAIN VANILLA KARP-RABIN FINGERPRINT ALGORITHM 16.6 VARIATIONS ON THE PLAIN VANILLA KARP-RABIN FINGERPRINT ALGORITHM 16.7 A NONHASHING KARP-RABIN FINGERPRINT
CHAPTER 17 Hashing Rock and Roll
17.1 OVERVIEW OF AUDIO FINGERPRINTING 17.2 THE BASICS OF FINGERPRINTING MUSIC 17.3 HAAR WAVELET CODING 17.4 MIN-HASH 17.5 SOME COMMERCIAL FINGERPRINTING PRODUCTS
CHAPTER 18 Hashing in E-Commerce
18.1 THE VARIED APPLICATIONS OF CRYPTOGRAPHY 18.2 AUTHENTICATION 18.3 THE NEED FOR CERTIFICATES 18.4 CRYPTOGRAPHIC HASH FUNCTIONS 18.5 X.509 CERTIFICATES AND CCIT STANDARDIZATION 18.6 THE SECURE SOCKET LAYER (SSL) 18.7 TRUST ON THE WEB · · · TRUST NO ONE OVER 40! 18.8 MD5 18.9 CRITICISM OF MD5 18.10 THE WANG-YU COLLISION ATTACK 18.11 STEVEN’S IMPROVEMENT TO THE WANG-YU COLLISION ATTACK 18.12 THE CHOSEN-PREFIX ATTACK ON MD5 18.13 THE ROGUE CA ATTACK SCENARIO 18.14 THE SECURE HASH ALGORITHMS 18.15 CRITICISM OF SHA-1 18.16 SHA-2 18.17 WHAT NOW? APPENDIX 18 Sketch of the Steven’s Chosen Prefix Attack A18.1 BIRTHDAYING1 [SCHNEIER 1996, PP. 165–166], [OORSCHOT AND WIENER 1999] A18.2 THE BINARY SIGNED DIGIT REPRESENTATION (BSDR) A18.3 DIFFERENTIAL ANALYSIS A18.4 OUTLINE OF THE STEVENS CONSTRUCTION
CHAPTER 19 Hashing and the Secure Distribution of Digital Media
19.1 OVERVIEW 19.2 INTELLECTUAL PROPERTY (COPYRIGHTS AND PATENTS) 19.3 STEGANOGRAPHY 19.4 BOIL, BOIL, TOIL AND · · · BUT FIRST, CAREFULLY MIX 19.5 SOFTWARE DISTRIBUTION SYSTEMS 19.6 WATERMARKS 19.7 AN IMAGE-PROCESSING TECHNIQUE FOR WATERMARKING 19.8 USING GEOMETRIC HASHING TO WATERMARK IMAGES 19.9 BIOMETRICS AND HASHING 19.10 THE DONGLE24 APPENDIX 19 Reed-Solomon and Hadamard Coding A.19.0 CODES A.19.1 REED-SOLOMON CODES A.19.3 HADAMARD CODES
Exercises and Solutions
PART II, CHAPTER 7 PART II, CHAPTER 8 PART II, CHAPTER 10 PART II, CHAPTER 11 PART II, CHAPTER 12 PART II, CHAPTER 13 PART II, CHAPTER 14 PART II, CHAPTER 15 PART III, CHAPTER 16 PART III, CHAPTER 17 PART III, CHAPTER 18 PART III, CHAPTER 19
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion