Kefei Chen1402079869, 9781402079863, 9781402079870
Table of contents :
Team DDU……Page 1
Contents……Page 8
Foreword……Page 12
Preface……Page 14
Randomness and Discrepancy Transforms……Page 18
Legendre Sequences and Modified Jacobi Sequences……Page 26
Resilient Functions with Good Cryptographic Properties……Page 34
Differential Factoring for Integers……Page 42
Simple and Efficient Systematic A-codes from Error Correcting Codes……Page 50
On Coefficients of Binary Expression of Integer Sums……Page 62
A new publicly verifiable proxy signcryption scheme……Page 70
Some New Proxy Signature Schemes from Pairings……Page 76
Construction of Digital Signature Schemes Based on DLP……Page 84
DLP-based blind signatures and their application in E-Cash systems……Page 90
A Group of Threshold Group-Signature Schemes with Privilege Subsets……Page 98
A New Group Signature Scheme with Unlimited Group Size……Page 106
Identity Based Signature Scheme Based on Quadratic Residues……Page 114
New Signature Scheme Based on Factoring and Discrete Logarithms……Page 124
New Transitive Signature Scheme based on Discreted Logarithm Problem……Page 130
Blind signature schemes based on GOST signature……Page 140
One-off Blind Public Key……Page 146
Analysis on the two classes of Robust Threshold Key Escrow Schemes……Page 154
Privacy-Preserving Approximately Equation Solving over Reals……Page 162
An Authenticated Key Agreement Protocol Resistant to DoS attack……Page 168
A comment on a multi-signature scheme……Page 174
Cryptanalysis of LKK Proxy Signature……Page 178
Attack on Identity-Based Broadcasting Encryption Schemes……Page 182
Differential-Linear Cryptanalysis of Camellia……Page 190
Security Analysis of EV-DO System……Page 198
A Remedy of Zhu-Lee-Deng’s Public Key Cryptosystem……Page 204
Quantum cryptographic algorithm for classical binary information……Page 212
Practical Quantum Key Distribution Network……Page 218
A Survey of P2P Network Security Issues based on Protocol Stack……Page 226
DDoS Scouter: A simple IP traceback scheme……Page 234
A Method of Digital Data Transformation¨CBase91……Page 246
An approach to the formal analysis of TMN protocol……Page 252
Reviews
There are no reviews yet.