Progress on Cryptography: 25 Years of Cryptography in China / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$130.23
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Hardcover)
  • All (5) from $1.99   
  • New (4) from $1.99   
  • Used (1) from $260.82   

Overview

Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students.
Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.
Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Read More Show Less

Product Details

Table of Contents

Foreword. Preface. Randomness and Discrepancy Transforms; Guang Gong. Legendre Sequences and Modified Jacobi Sequences; Enjian Bai, Bin Zhang Resilient Functions with Good Cryptographic Properties; Wen Qiao-yan, Zhang Jie. Differential Factoring for Integers; Chuan-Kun Wu. Simple and Efficient Systematic A-codes from Error Correcting Codes; Cunsheng Ding, Xiaojian nan, Xuesong Wang. On Coefficients of Binary Expression of Integer Sums; Bao Li, Zongduo Dai. A new publicly verifiable proxy sign-cryption scheme; Zhang Zhang, Qingkuan Dong, Mian Cai. Some New Proxy Signature Schemes from Pairings; Fangguo Zhang, R. Safavi-Naini, Chih-Yin Lin. Construction of Digital Signature Schemes Based on DLP; Wei-Zhang Du , Kefei Chen. DLP-based blind signatures and their application in E-Cash systems; Weidong Qiu. A Group of Threshold Group-Signature Schemes with Privilege Subsets; Chen Weidong, Feng Dengguo. A New Group Signature Scheme with Unlimited Group Size; Fu Xiaotong, Xu Chunxiang. Identity Based Signature Scheme Based on Quadratic Residues; Weidong Qiu, Kefei Chen. New Signature Scheme Based on Factoring and Discrete Logarithms; Shimin Wei. New Transitive Signature Scheme based on Discreted Logarithm Problem; Zichen Li, Juanmei Zhang, Dong Zheng. Blind signature schemes based on GOST signature; Zhenjie Huang, Yumin Wang. One-off Blind Public Key; Zhang Qiupu, Guo Baoan. Analysis on the two classes of Robust Threshold Key Escrow Schemes; Feng Dengguo, Chen Weidong. Privacy-Preserving Approximately Equation Solving over Reals; Zhi Gan, Qiang Li, Kefei Chen. An Authenticated Key Agreement Prool Resistant to DoS attack; Lu Haining, Gu Dawu. A comment on a multi-signature scheme; Zheng Dong, Chen Kefei, He Liangsheng. Cryptanalysis of LKK Proxy Signature; Zheng Dong, Liu Sheng/i, Chen Kefei. Attack on Identity-Based Broadcasting Encryption Schemes; Sheng/i Liu, Zheng Dong, Kefei Chen. Differential-Linear Cryptanalysis of Camellia; Wen/inK Wu; Dengguo Feng. Security Analysis of EV-DO System; Zhu, Hong Ru. A Remedy of Zhu-Lee-Deng's Public Key Cryptosystem; Huafei Zhu, Yongjian Liao. Quantum cryptographic algorithm for classical binary information; Nanrun Zhou, Guihua Zeng. Practical Quantum Key Distribution Network; Jie Zhu, Guihua Zeng. A Survey of P2P Network Security Issues based on Prool Stack; Zhang Dehua, Zhang Yuqing. DDoS Scouter: A simple IP traceback scheme; Chen Kai, Hu Xiaoxin, Hao Ruibing. A Method of Digital Data Transformation-Base91; He Dake, He Wei. An approach to the formal analysis of TMN prool; Zhang Yu-Qing, Liu Xiu-fing.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)