Progress on Cryptography 25 Years of Cryptography in China /
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via th...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2004.
|
Σειρά: | The International Series in Engineering and Computer Science,
769 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Randomness and Discrepancy Transforms
- Legendre Sequences and Modified Jacobi Sequences
- Resilient Functions with Good Cryptographic Properties
- Differential Factoring for Integers
- Simple and Efficient Systematic a-Codes from Error Correcting Codes
- On Coefficients of Binary Expression of Integer Sums
- A New Publicly Verifiable Proxy Signcryption Scheme
- Some New Proxy Signature Schemes from Pairings
- Construction of Digital Signature Schemes Based on Discrete Logarithm Problem
- How to Construct DLP-Based Blind Signatures and Their Application in E-Cash Systems
- A Group of Threshold Group-Signature Schemes with Privilege Subsets
- A New Group Signature Scheme with Unlimited Group Size
- Identity Based Signature Scheme Based on Quadratic Residues
- A New Digital Signature Scheme Based on Factoring and Discrete Logarithms
- New Transitive Signature Scheme Based on Discreted Logarithm Problem
- Blind Signature Schemes Based on Gost Signature
- One-Off Blind Public Key
- Analysis on the Two Classes of Robust Threshold Key Escrow Schemes
- Privacy-Preserving Approximately Equation Solving Over Reals
- An Authenticated Key Agreement Protocol Resistant to DoS Attack
- A Comment on a Multi-Signature Scheme
- Cryptanalysis of LKK Proxy Signature
- Attack on Identity-Based Broadcasting Encryption Schemes
- Differential-Linear Cryptanalysis of Camellia
- Security Analysis of EV-DO System
- A Remedy of Zhu-Lee-Deng’s Public Key Cryptosystem
- Quantum Cryptographic Algorithm for Classical Binary Information
- Practical Quantum Key Distribution Network Based on Stratosphere Platform
- A Survey of P2P Network Security Issues Based on Protocol Stack
- DDoS Scouter: A Simple IP Traceback Scheme
- A Method of Digital Data Transformation-Base91
- An Approach to the Formal Analysis of TMN Protocol.