计算机安全与取证之哈希函数和公钥加密
Security properties of hash functions Constructions for hash functions SHA-1, SHA-2 Application of hashing: Password hashing. Public Key Encryption IND-CCA Security of Public Key Encryption Key Encapsulation Mechanisms Hybrid Encryption
