Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve
Radio Frequency Identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem.
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bits or IV bits). The cryptanalyst is allowed to tweak the polynomials b
Review From the reviews: "The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in
The Mathematics of the RSA Public-Key Cryptosystem :RSA公钥加密的数学原理及历史 The Mathematics of the RSA Public-Key Cryptosystem :RSA公钥加密的数学原理及历史 The Mathematics of the RSA Public-Key Cryptosystem :RSA公钥加密的数学原理及历史
英文原版书 部分目录 FOREWORD ix PREFACE xi ABOUT THE AUTHOR xvii CHAPTER 1 APERITIFS 1.1 The Lexicon of Cryptography 1 1.2 Cryptographic Systems 4 1.3 Cryptanalysis 4 1.4 Side Information 6 1.5 Thomas Jefferson and the M-94 6 1.6 Cryptography and History 7 1
The book is organized into three parts. The first part, Chapters 1-3, covers private-key cryptography. Chapters 4–9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas i
The first part consists of the following material: Chapter 1 is a fairly elementary introduction to simple “classical” cryptosystems. Chapter 2 covers the main elements of Shannon’s approach to cryptography, including the concept of perfect secrecy
Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask