Progress on Cryptography: 25 Years of Cryptography in China

Progress on Cryptography: 25 Years of Cryptography in China

by Kefei Chen (Editor)

Paperback(Softcover reprint of the original 1st ed. 2004)

Choose Expedited Shipping at checkout for guaranteed delivery by Tuesday, January 29

Product Details

ISBN-13: 9781475779622
Publisher: Springer US
Publication date: 04/14/2013
Series: The Springer International Series in Engineering and Computer Science , #769
Edition description: Softcover reprint of the original 1st ed. 2004
Pages: 246
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Foreword. Preface. Randomness and Discrepancy Transforms; Guang Gong. Legendre Sequences and Modified Jacobi Sequences; Enjian Bai, Bin Zhang Resilient Functions with Good Cryptographic Properties; Wen Qiao-yan, Zhang Jie. Differential Factoring for Integers; Chuan-Kun Wu. Simple and Efficient Systematic A-codes from Error Correcting Codes; Cunsheng Ding, Xiaojian nan, Xuesong Wang. On Coefficients of Binary Expression of Integer Sums; Bao Li, Zongduo Dai. A new publicly verifiable proxy sign-cryption scheme; Zhang Zhang, Qingkuan Dong, Mian Cai. Some New Proxy Signature Schemes from Pairings; Fangguo Zhang, R. Safavi-Naini, Chih-Yin Lin. Construction of Digital Signature Schemes Based on DLP; Wei-Zhang Du , Kefei Chen. DLP-based blind signatures and their application in E-Cash systems; Weidong Qiu. A Group of Threshold Group-Signature Schemes with Privilege Subsets; Chen Weidong, Feng Dengguo. A New Group Signature Scheme with Unlimited Group Size; Fu Xiaotong, Xu Chunxiang. Identity Based Signature Scheme Based on Quadratic Residues; Weidong Qiu, Kefei Chen. New Signature Scheme Based on Factoring and Discrete Logarithms; Shimin Wei. New Transitive Signature Scheme based on Discreted Logarithm Problem; Zichen Li, Juanmei Zhang, Dong Zheng. Blind signature schemes based on GOST signature; Zhenjie Huang, Yumin Wang. One-off Blind Public Key; Zhang Qiupu, Guo Baoan. Analysis on the two classes of Robust Threshold Key Escrow Schemes; Feng Dengguo, Chen Weidong. Privacy-Preserving Approximately Equation Solving over Reals; Zhi Gan, Qiang Li, Kefei Chen. An Authenticated Key Agreement Protocol Resistant to DoS attack; Lu Haining, Gu Dawu. A comment on a multi-signature scheme; Zheng Dong, Chen Kefei, He Liangsheng. Cryptanalysis of LKK Proxy Signature; Zheng Dong, Liu Sheng/i, Chen Kefei. Attack on Identity-Based Broadcasting Encryption Schemes; Sheng/i Liu, Zheng Dong, Kefei Chen. Differential-Linear Cryptanalysis of Camellia; Wen/inK Wu; Dengguo Feng. Security Analysis of EV-DO System; Zhu, Hong Ru. A Remedy of Zhu-Lee-Deng's Public Key Cryptosystem; Huafei Zhu, Yongjian Liao. Quantum cryptographic algorithm for classical binary information; Nanrun Zhou, Guihua Zeng. Practical Quantum Key Distribution Network; Jie Zhu, Guihua Zeng. A Survey of P2P Network Security Issues based on Protocol Stack; Zhang Dehua, Zhang Yuqing. DDoS Scouter: A simple IP traceback scheme; Chen Kai, Hu Xiaoxin, Hao Ruibing. A Method of Digital Data Transformation-Base91; He Dake, He Wei. An approach to the formal analysis of TMN protocol; Zhang Yu-Qing, Liu Xiu-fing.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews