Wonder Club world wonders pyramid logo
×

Progress on Cryptography Book

Progress on Cryptography
Progress on Cryptography, Cryptography in Chinese consists of two characters meaning secret coded. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c, Progress on Cryptography has a rating of 2.5 stars
   2 Ratings
X
Progress on Cryptography, Cryptography in Chinese consists of two characters meaning secret coded. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c, Progress on Cryptography
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $181.44
Original Magazine
Physical Format

Sold Out

  • Progress on Cryptography
  • Written by author Kefei Chen
  • Published by Springer-Verlag New York, LLC, October 2007
  • Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c
  • Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c
Buy Digital  USD$181.44

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Randomness and discrepancy transforms1
Legendre sequences and modified Jacobi sequences9
Resilient functions with good cryptographic properties17
Differential factoring for integers25
Simple and efficient systematic A-codes from error correcting codes33
On coefficients of binary expression of integer sums45
A new publicly verifiable proxy signcryption scheme53
Some new proxy signature schemes from pairings59
Construction of digital signature schemes based on DLP67
DLP-based blind signatures and their application in E-cash systems73
A group of threshold group-signature schemes with privilege subsets81
A new group signature scheme with unlimited group size89
Identity based signature scheme based on quadratic residues97
New signature scheme based on factoring and discrete logarithms107
New transitive signature scheme based on discreted logarithm problem113
Blind signature schemes based on GOST signature123
One-off blind public key129
Analysis on the two classes of robust threshold key escrow schemes137
Privacy-preserving approximately equation solving over reals145
An authenticated key agreement protocol resistant to DoS attack151
A comment on a multi-signature scheme157
Crypatanalysis of LKK proxy signature161
Attack on identity-based broadcasting encryption schemes165
Differential-linear cryptanalysis of Camellia173
Security analysis of EV-DO system181
A remedy of Zhu-Lee-Deng's public key cryptosystem187
Quantum cryptographic algorithm for classical binary information195
Practical quantum key distribution network201
A survey of P2P network security issues based on protocol stack209
DDoS scouter : a simple IP traceback scheme217
A method of digital data transformation-base91229
An approach to the formal analysis of TMN protocol235


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Progress on Cryptography, Cryptography in Chinese consists of two characters meaning secret coded. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c, Progress on Cryptography

X
WonderClub Home

This item is in your Collection

Progress on Cryptography, Cryptography in Chinese consists of two characters meaning secret coded. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c, Progress on Cryptography

Progress on Cryptography

X
WonderClub Home

This Item is in Your Inventory

Progress on Cryptography, Cryptography in Chinese consists of two characters meaning secret coded. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed c, Progress on Cryptography

Progress on Cryptography

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: