Progress on Cryptography 25 Years of Cryptography in China /

Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via th...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Kefei (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2004.
Σειρά:The International Series in Engineering and Computer Science, 769
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05379nam a22005775i 4500
001 978-1-4020-7987-0
003 DE-He213
005 20151204184646.0
007 cr nn 008mamaa
008 100301s2004 xxu| s |||| 0|eng d
020 |a 9781402079870  |9 978-1-4020-7987-0 
024 7 |a 10.1007/b116807  |2 doi 
040 |d GrThAP 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a GPF  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
082 0 4 |a 003.54  |2 23 
245 1 0 |a Progress on Cryptography  |h [electronic resource] :  |b 25 Years of Cryptography in China /  |c edited by Kefei Chen. 
264 1 |a Boston, MA :  |b Springer US,  |c 2004. 
300 |a XV, 246 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a The International Series in Engineering and Computer Science,  |x 0893-3405 ;  |v 769 
505 0 |a Randomness and Discrepancy Transforms -- Legendre Sequences and Modified Jacobi Sequences -- Resilient Functions with Good Cryptographic Properties -- Differential Factoring for Integers -- Simple and Efficient Systematic a-Codes from Error Correcting Codes -- On Coefficients of Binary Expression of Integer Sums -- A New Publicly Verifiable Proxy Signcryption Scheme -- Some New Proxy Signature Schemes from Pairings -- Construction of Digital Signature Schemes Based on Discrete Logarithm Problem -- How to Construct DLP-Based Blind Signatures and Their Application in E-Cash Systems -- A Group of Threshold Group-Signature Schemes with Privilege Subsets -- A New Group Signature Scheme with Unlimited Group Size -- Identity Based Signature Scheme Based on Quadratic Residues -- A New Digital Signature Scheme Based on Factoring and Discrete Logarithms -- New Transitive Signature Scheme Based on Discreted Logarithm Problem -- Blind Signature Schemes Based on Gost Signature -- One-Off Blind Public Key -- Analysis on the Two Classes of Robust Threshold Key Escrow Schemes -- Privacy-Preserving Approximately Equation Solving Over Reals -- An Authenticated Key Agreement Protocol Resistant to DoS Attack -- A Comment on a Multi-Signature Scheme -- Cryptanalysis of LKK Proxy Signature -- Attack on Identity-Based Broadcasting Encryption Schemes -- Differential-Linear Cryptanalysis of Camellia -- Security Analysis of EV-DO System -- A Remedy of Zhu-Lee-Deng’s Public Key Cryptosystem -- Quantum Cryptographic Algorithm for Classical Binary Information -- Practical Quantum Key Distribution Network Based on Stratosphere Platform -- A Survey of P2P Network Security Issues Based on Protocol Stack -- DDoS Scouter: A Simple IP Traceback Scheme -- A Method of Digital Data Transformation-Base91 -- An Approach to the Formal Analysis of TMN Protocol. 
520 |a Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering. 
650 0 |a Computer science. 
650 0 |a Data structures (Computer science). 
650 0 |a Coding theory. 
650 0 |a Computers. 
650 0 |a Computer science  |x Mathematics. 
650 0 |a Management information systems. 
650 0 |a Computer engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Computer Engineering. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Discrete Mathematics in Computer Science. 
650 2 4 |a Management of Computing and Information Systems. 
700 1 |a Chen, Kefei.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781402079863 
830 0 |a The International Series in Engineering and Computer Science,  |x 0893-3405 ;  |v 769 
856 4 0 |u http://dx.doi.org/10.1007/b116807  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
912 |a ZDB-2-BAE 
950 |a Engineering (Springer-11647)