您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. An Efficient and Secure RFID Security Method

  2. Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve
  3. 所属分类:其它

    • 发布日期:2010-06-24
    • 文件大小:227328
    • 提供者:gewwntea
  1. Two Security Problems of RFID Security Method with Ownership Transfer

  2. Radio Frequency Identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem.
  3. 所属分类:其它

    • 发布日期:2010-06-24
    • 文件大小:204800
    • 提供者:gewwntea
  1. ECElgamal Delphi

  2.  ElGamal discrete log cryptosystem — ECElGamal   对于ECC系统来说,完成运行系统所必须的群操作比同样大小的因数分解系统或模整数离散对数系统要慢。不过,ECC系统的拥护者相信ECDLP问题比DLP或因数分解问题要难的多,并且因此使用ECC能用小的多的密钥长度来提供同等的安全,在这方面来说它确实比例如RSA之类的更快。到目前为止已经公布的结果趋于支持这个结论,不过一些专家表示怀疑。   ECC被广泛认为是在给定密钥长度的情况下,最强大的非对称算法,
  3. 所属分类:Delphi

    • 发布日期:2010-08-02
    • 文件大小:63488
    • 提供者:zhongruiguang
  1. Twenty Years of Attacks on the RSA Cryptosystem

  2. Twenty Years of Attacks on the Cryptosystem
  3. 所属分类:专业指导

    • 发布日期:2008-03-16
    • 文件大小:310272
    • 提供者:osoon
  1. Cube Attacks on Tweakable Black Box Polynomials

  2. Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bits or IV bits). The cryptanalyst is allowed to tweak the polynomials b
  3. 所属分类:其它

    • 发布日期:2010-12-23
    • 文件大小:252928
    • 提供者:shuaimengxia
  1. An introduction to mathematical cryptography

  2. Review From the reviews: "The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in
  3. 所属分类:其它

    • 发布日期:2011-09-18
    • 文件大小:7340032
    • 提供者:ysoh2
  1. 密码学算法协议c实现.pdf

  2. 加密散列函数 (消息摘要算法,MD算法)      加密散列函数   消息认证码   Keyed-hash message authentication code   EMAC (NESSIE selection MAC)   HMAC (NESSIE selection MAC; ISO/IEC 9797-1,FIPS and IETF RFC)   TTMAC 也称 Two-Track-MAC (NESSIE selection MAC; K.U.Leuven (Belgium) & de
  3. 所属分类:其它

  1. The Mathematics of the RSA Public-Key Cryptosystem

  2. The Mathematics of the RSA Public-Key Cryptosystem :RSA公钥加密的数学原理及历史 The Mathematics of the RSA Public-Key Cryptosystem :RSA公钥加密的数学原理及历史 The Mathematics of the RSA Public-Key Cryptosystem :RSA公钥加密的数学原理及历史
  3. 所属分类:网络安全

    • 发布日期:2012-01-05
    • 文件大小:67584
    • 提供者:wzb56
  1. 计算机安全与密码学 Computer.Security.And.Cryptography.

  2. 英文原版书 部分目录 FOREWORD ix PREFACE xi ABOUT THE AUTHOR xvii CHAPTER 1 APERITIFS 1.1 The Lexicon of Cryptography 1 1.2 Cryptographic Systems 4 1.3 Cryptanalysis 4 1.4 Side Information 6 1.5 Thomas Jefferson and the M-94 6 1.6 Cryptography and History 7 1
  3. 所属分类:其它

    • 发布日期:2012-02-07
    • 文件大小:14680064
    • 提供者:fality
  1. Cryptography: Theory and Practice 03/17/95

  2. The book is organized into three parts. The first part, Chapters 1-3, covers private-key cryptography. Chapters 4–9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas i
  3. 所属分类:其它

    • 发布日期:2012-03-05
    • 文件大小:14680064
    • 提供者:hcq0394
  1. Cryptography: Theory and Practice

  2. The first part consists of the following material: Chapter 1 is a fairly elementary introduction to simple “classical” cryptosystems. Chapter 2 covers the main elements of Shannon’s approach to cryptography, including the concept of perfect secrecy
  3. 所属分类:其它

    • 发布日期:2012-03-05
    • 文件大小:14680064
    • 提供者:hcq0394
  1. ElGamal-A public key cryptosystem

  2. ElGamal-A public key cryptosystem and a signature scheme based on the discrete logarithm.pdf
  3. 所属分类:网络安全

    • 发布日期:2015-11-24
    • 文件大小:347136
    • 提供者:qq_32614009
  1. Estimating the φ(n) of Upper_Lower Bound in its RSA Cryptosystem

  2. Estimating the φ(n) of Upper_Lower Bound in its RSA Cryptosystem
  3. 所属分类:讲义

    • 发布日期:2018-10-09
    • 文件大小:104448
    • 提供者:weixin_42282037
  1. A color image cryptosystem based on dynamic DNA encryption and chaos.pdf

  2. A color image cryptosystem based on dynamic DNA encryption and chaos
  3. 所属分类:系统安全

    • 发布日期:2019-07-31
    • 文件大小:8388608
    • 提供者:llxxyy1017
  1. Discussion and a new method of optical cryptosystem based on interference

  2. Discussion and a new method of optical cryptosystem based on interference
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:2097152
    • 提供者:weixin_38691482
  1. How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks

  2. How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
  3. 所属分类:其它

    • 发布日期:2021-02-10
    • 文件大小:312320
    • 提供者:weixin_38680492
  1. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based enc

  2. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask
  3. 所属分类:其它

    • 发布日期:2021-02-10
    • 文件大小:512000
    • 提供者:weixin_38731145
  1. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comme

  2. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:53248
    • 提供者:weixin_38660108
  1. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain

  2. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain
  3. 所属分类:其它

    • 发布日期:2021-02-08
    • 文件大小:1048576
    • 提供者:weixin_38752628
  1. Improved reversible data hiding based on encrypted signals with public key cryptosystem

  2. Improved reversible data hiding based on encrypted signals with public key cryptosystem
  3. 所属分类:其它

    • 发布日期:2021-02-08
    • 文件大小:219136
    • 提供者:weixin_38738189
« 12 »