信息安全與密碼學(xué)

出版時(shí)間:2011-6  出版社:來(lái)學(xué)嘉 科學(xué)出版社 (2011-06出版)  作者:來(lái)學(xué)嘉  頁(yè)數(shù):195  

內(nèi)容概要

  由來(lái)學(xué)嘉編著的《信息安全與密碼學(xué)(英文版)》是2010年10月在上海召開(kāi)的第六屆中國(guó)密碼學(xué)與信息安全國(guó)際會(huì)議(The 6th china International Conference on Information Security andcryptology- Inscrypt 2010)的短論文文集。lnscrypt系列國(guó)際會(huì)議是由信息安全國(guó)家重點(diǎn)實(shí)驗(yàn)室發(fā)起,與中國(guó)密碼學(xué)會(huì)聯(lián)合舉辦的高水平國(guó)際會(huì)議,每年在中國(guó)舉辦一次,該會(huì)議論文集由Springer出版社出版。本書(shū)收錄了這次會(huì)議的短文13篇。主要內(nèi)容包括公鑰和橢圓曲線密碼學(xué)、密碼系統(tǒng)構(gòu)造、系統(tǒng)安全等?!  缎畔踩c密碼學(xué)(英文版)》可供從事密碼學(xué)、信息安全、通信與信息系統(tǒng)、計(jì)算機(jī)應(yīng)用技術(shù)等專(zhuān)業(yè)的科技人員和高等院校師生參考。

書(shū)籍目錄

Ⅰ Public Key and Elliptic Curve CryptographyAttacking Code/Lattice-based Cryptosystems Using Partial Knowledge Robert Niebuhr, Pierre-Louis Cayrel, Stanislav Bulygin, Johannes BachmannMultivariate Quadratic Quasigroups (MQQs): Construction, Bounds and ComplexityYanling Chen, Svein Johan Knapskog, Danilo GligoroskiHow to Hash into Twisted Edwards Form Elliptic Curves Wei Yu, KunPeng WangFast Algorithm Converting Integer to Double Base Chain Wei Yu, KunPeng Wang, Bao LiⅡ Cryptographic ConstructionVisualizing Key Authenticity: Turning Your Face into Your Public Key..Joan Arnedo-Moreno, Agata LapedrizaPractical Multi-signature Scheme in the Plain Public Key Model with Tight SecurityChangshe MaSecurity Improvement of a Pixel Bit Based Image ScramblingEncryption Scheme Through the Self-correlation MethodLiang Zhao, Avishek Adhikari, Di Xiao, Kouichi SakuraiHierarchical Attributes: Practical Extension for Attribute-based EncryptionSong Luo, Jianbin Hu, Zhong ChenA Modular Proof Technique for Password-based Authenticated Key Exchange ProtocolsLibin Wang, Jiaxin Pan, Changshe MaCryptographic Hash Functions: Recent Design Trends and Security NotionsSail Al-Kuwari, James H. Davenport, Russell J. BradfordⅢ System SecurityThree-party Password Authenticated Key Exchange in the Standard ModelXuexian Hu, Zhenfeng Zhang, Wenfen LiuTicket Based Pre-authentication Method for Trusted Nodes in Proxy Mobile IPv6 DomainLing Tie, Di HeSoftware Protection Combined with HardwareKazuhide Fukushima, Kiyomoto Shinsaku, Toshiaki TanakaAuthor Index

編輯推薦

由來(lái)學(xué)嘉編著的《信息安全與密碼學(xué)(英文版)》是2010年10月在上海召開(kāi)的第六屆中國(guó)密碼學(xué)與信息安全國(guó)際會(huì)議(The 6th china International Conference on Information Security andcryptology-Inscrypt 2010)的短論文文集。本書(shū)主要內(nèi)容包括公鑰和橢圓曲線密碼學(xué)、密碼系統(tǒng)構(gòu)造、系統(tǒng)安全等。

圖書(shū)封面

評(píng)論、評(píng)分、閱讀與下載


    信息安全與密碼學(xué) PDF格式下載


用戶評(píng)論 (總計(jì)0條)

 
 

 

250萬(wàn)本中文圖書(shū)簡(jiǎn)介、評(píng)論、評(píng)分,PDF格式免費(fèi)下載。 第一圖書(shū)網(wǎng) 手機(jī)版

京ICP備13047387號(hào)-7