資料來源: Google Book
Progress on cryptography :25 years of cryptography in China
- 其他作者: Chen, Kefei, , Xiao, G.
- 出版: Boston : Kluwer Academic Publishers ©2004.
- 稽核項: 1 online resource (xiv, 246 pages) :illustrations.
- 叢書名: Kluwer international series in engineering and computer science ;SECS 769
- 標題: SecurityCryptography. , informatiesystemen , Computer security. , COMPUTERS , Computer Science. , Informatie- en communicatietechnologie (algemeen) , COMPUTERS Security -- Cryptography. , computertechnieken , Electronic books. , Sécurité informatique Chine -- Histoire -- Congrès. , Cryptografie. , Cryptography , informatietheorie , computerwetenschappen , History. , Computer security , computational science , mathematics , Cryptographie , Computer security China -- History -- Congresses. , computer sciences , data structures , gegevensstructuren , Actes de congrès. , Cryptography China -- History -- Congresses. , Sécurité informatique , Cryptography. , History , information systems , Cryptographie Chine -- Histoire -- Congrès. , Congress , Histoire , computer techniques , Information and Communication Technology (General) , Engineering & Applied Sciences. , Conference papers and proceedings. , wiskunde , China. , information theory
- ISBN: 1402079877 , 9781402079870
- ISBN: 9781402079863 , 1402079869
- 試查全文@TNUA:
- 附註: "Celebration of Professor Guozhen Xiao's 70th birthday"--Preface. "Papers presented at an international workshop in conjunction with ChinaCrypt 2004"--Page [iv] of cover. Includes bibliographical references and index. Foreword -- Preface -- Randomness and Discrepancy Transforms -- Legendre Sequences and Modified Jacobi Sequences -- Resilient Functions with Good Cryptographic Properties -- Differential Factoring for Integers -- Simple and Efficient Systematic A-codes from Error Correcting Codes -- On Coefficients of Binary Expression of Integer Sums -- A new publicly verifiable proxy sign-cryption scheme -- Some New Proxy Signature Schemes from Pairings -- Construction of Digital Signature Schemes Based on DLPDLP-based blind signatures and their application in E-Cash systems -- A Group of Threshold Group-Signature Schemes with Privilege Subsets -- A New Group Signature Scheme with Unlimited Group Size -- Identity Based Signature Scheme Based on Quadratic Residues -- New Signature Scheme Based on Factoring and Discrete Logarithms -- New Transitive Signature Scheme based on Discrete Logarithm ProblemBlind signature schemes based on GOST signature -- One-off Blind Public Key -- Analysis on the two classes of Robust Threshold Key Escrow Schemes. 12 additional articles.
- 摘要: Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
- 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=112715
- 系統號: 005322521
- 資料類型: 電子書
- 讀者標籤: 需登入
- 引用網址: 複製連結
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
來源: Google Book
來源: Google Book
評分