Sold Out
Book Categories |
Randomness and discrepancy transforms | 1 | |
Legendre sequences and modified Jacobi sequences | 9 | |
Resilient functions with good cryptographic properties | 17 | |
Differential factoring for integers | 25 | |
Simple and efficient systematic A-codes from error correcting codes | 33 | |
On coefficients of binary expression of integer sums | 45 | |
A new publicly verifiable proxy signcryption scheme | 53 | |
Some new proxy signature schemes from pairings | 59 | |
Construction of digital signature schemes based on DLP | 67 | |
DLP-based blind signatures and their application in E-cash systems | 73 | |
A group of threshold group-signature schemes with privilege subsets | 81 | |
A new group signature scheme with unlimited group size | 89 | |
Identity based signature scheme based on quadratic residues | 97 | |
New signature scheme based on factoring and discrete logarithms | 107 | |
New transitive signature scheme based on discreted logarithm problem | 113 | |
Blind signature schemes based on GOST signature | 123 | |
One-off blind public key | 129 | |
Analysis on the two classes of robust threshold key escrow schemes | 137 | |
Privacy-preserving approximately equation solving over reals | 145 | |
An authenticated key agreement protocol resistant to DoS attack | 151 | |
A comment on a multi-signature scheme | 157 | |
Crypatanalysis of LKK proxy signature | 161 | |
Attack on identity-based broadcasting encryption schemes | 165 | |
Differential-linear cryptanalysis of Camellia | 173 | |
Security analysis of EV-DO system | 181 | |
A remedy of Zhu-Lee-Deng's public key cryptosystem | 187 | |
Quantum cryptographic algorithm for classical binary information | 195 | |
Practical quantum key distribution network | 201 | |
A survey of P2P network security issues based on protocol stack | 209 | |
DDoS scouter : a simple IP traceback scheme | 217 | |
A method of digital data transformation-base91 | 229 | |
An approach to the formal analysis of TMN protocol | 235 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionProgress on Cryptography
X
This Item is in Your InventoryProgress on Cryptography
X
You must be logged in to review the productsX
X
X
Add Progress on Cryptography, Cryptography in Chinese consists of two characters meaning secret coded. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c, Progress on Cryptography to the inventory that you are selling on WonderClubX
X
Add Progress on Cryptography, Cryptography in Chinese consists of two characters meaning secret coded. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c, Progress on Cryptography to your collection on WonderClub |