• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Progress on Cryptography: 25 Years of Cryptography in China » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Progress on Cryptography: 25 Years of Cryptography in China

ISBN-13: 9781475779622 / Angielski / Miękka / 2013 / 246 str.

Kefei Chen
Progress on Cryptography: 25 Years of Cryptography in China Chen, Kefei 9781475779622 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Progress on Cryptography: 25 Years of Cryptography in China

ISBN-13: 9781475779622 / Angielski / Miękka / 2013 / 246 str.

Kefei Chen
cena 402,53
(netto: 383,36 VAT:  5%)

Najniższa cena z 30 dni: 385,52
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding." China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Kategorie:
Informatyka
Kategorie BISAC:
Mathematics > Algebra - General
Computers > Information Theory
Computers > Computer Science
Wydawca:
Springer
Seria wydawnicza:
Springer International Series in Engineering and Computer Sc
Język:
Angielski
ISBN-13:
9781475779622
Rok wydania:
2013
Wydanie:
Softcover Repri
Numer serii:
000348000
Ilość stron:
246
Waga:
0.41 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Wolumenów:
01

Foreword. Preface. Randomness and Discrepancy Transforms; Guang Gong. Legendre Sequences and Modified Jacobi Sequences; Enjian Bai, Bin Zhang Resilient Functions with Good Cryptographic Properties; Wen Qiao-yan, Zhang Jie. Differential Factoring for Integers; Chuan-Kun Wu. Simple and Efficient Systematic A-codes from Error Correcting Codes; Cunsheng Ding, Xiaojian nan, Xuesong Wang. On Coefficients of Binary Expression of Integer Sums; Bao Li, Zongduo Dai. A new publicly verifiable proxy sign-cryption scheme; Zhang Zhang, Qingkuan Dong, Mian Cai. Some New Proxy Signature Schemes from Pairings; Fangguo Zhang, R. Safavi-Naini, Chih-Yin Lin. Construction of Digital Signature Schemes Based on DLP; Wei-Zhang Du , Kefei Chen. DLP-based blind signatures and their application in E-Cash systems; Weidong Qiu. A Group of Threshold Group-Signature Schemes with Privilege Subsets; Chen Weidong, Feng Dengguo. A New Group Signature Scheme with Unlimited Group Size; Fu Xiaotong, Xu Chunxiang. Identity Based Signature Scheme Based on Quadratic Residues; Weidong Qiu, Kefei Chen. New Signature Scheme Based on Factoring and Discrete Logarithms; Shimin Wei. New Transitive Signature Scheme based on Discreted Logarithm Problem; Zichen Li, Juanmei Zhang, Dong Zheng. Blind signature schemes based on GOST signature; Zhenjie Huang, Yumin Wang. One-off Blind Public Key; Zhang Qiupu, Guo Baoan. Analysis on the two classes of Robust Threshold Key Escrow Schemes; Feng Dengguo, Chen Weidong. Privacy-Preserving Approximately Equation Solving over Reals; Zhi Gan, Qiang Li, Kefei Chen. An Authenticated Key Agreement Protocol Resistant to DoS attack; Lu Haining, Gu Dawu. A comment on a multi-signature scheme; Zheng Dong, Chen Kefei, He Liangsheng. Cryptanalysis of LKK Proxy Signature; Zheng Dong, Liu Sheng/i, Chen Kefei. Attack on Identity-Based Broadcasting Encryption Schemes; Sheng/i Liu, Zheng Dong, Kefei Chen. Differential-Linear Cryptanalysis of Camellia; Wen/inK Wu; Dengguo Feng. Security Analysis of EV-DO System; Zhu, Hong Ru. A Remedy of Zhu-Lee-Deng's Public Key Cryptosystem; Huafei Zhu, Yongjian Liao. Quantum cryptographic algorithm for classical binary information; Nanrun Zhou, Guihua Zeng. Practical Quantum Key Distribution Network; Jie Zhu, Guihua Zeng. A Survey of P2P Network Security Issues based on Protocol Stack; Zhang Dehua, Zhang Yuqing. DDoS Scouter: A simple IP traceback scheme; Chen Kai, Hu Xiaoxin, Hao Ruibing. A Method of Digital Data Transformation-Base91; He Dake, He Wei. An approach to the formal analysis of TMN protocol; Zhang Yu-Qing, Liu Xiu-fing.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia