Progress on Cryptography 25 Years of Cryptography in China /
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via th...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US,
2004.
|
Series: | The International Series in Engineering and Computer Science,
769 |
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- Randomness and Discrepancy Transforms
- Legendre Sequences and Modified Jacobi Sequences
- Resilient Functions with Good Cryptographic Properties
- Differential Factoring for Integers
- Simple and Efficient Systematic a-Codes from Error Correcting Codes
- On Coefficients of Binary Expression of Integer Sums
- A New Publicly Verifiable Proxy Signcryption Scheme
- Some New Proxy Signature Schemes from Pairings
- Construction of Digital Signature Schemes Based on Discrete Logarithm Problem
- How to Construct DLP-Based Blind Signatures and Their Application in E-Cash Systems
- A Group of Threshold Group-Signature Schemes with Privilege Subsets
- A New Group Signature Scheme with Unlimited Group Size
- Identity Based Signature Scheme Based on Quadratic Residues
- A New Digital Signature Scheme Based on Factoring and Discrete Logarithms
- New Transitive Signature Scheme Based on Discreted Logarithm Problem
- Blind Signature Schemes Based on Gost Signature
- One-Off Blind Public Key
- Analysis on the Two Classes of Robust Threshold Key Escrow Schemes
- Privacy-Preserving Approximately Equation Solving Over Reals
- An Authenticated Key Agreement Protocol Resistant to DoS Attack
- A Comment on a Multi-Signature Scheme
- Cryptanalysis of LKK Proxy Signature
- Attack on Identity-Based Broadcasting Encryption Schemes
- Differential-Linear Cryptanalysis of Camellia
- Security Analysis of EV-DO System
- A Remedy of Zhu-Lee-DengỚ"s Public Key Cryptosystem
- Quantum Cryptographic Algorithm for Classical Binary Information
- Practical Quantum Key Distribution Network Based on Stratosphere Platform
- A Survey of P2P Network Security Issues Based on Protocol Stack
- DDoS Scouter: A Simple IP Traceback Scheme
- A Method of Digital Data Transformation-Base91
- An Approach to the Formal Analysis of TMN Protocol.