About 158 item dissertation in line with public key cryptosystem query results,the following is 1 to 50(Search took 0.060 seconds)

  1. The Improved Public-key Encryption Algorithm Based on Finite Field Chebyshev Polynomial and RSA Cryptosystem,TanZuGang/Central South University,0/3
  2. Research on Certiifcateless Proxy Re-signature Basd on Cetrificateless Public Cryptosystem,LiangYiZuo/Lanzhou University of Technology,0/45
  3. Investigations of Power Analysis Attacks on Cryptographic Hardware of Rainbow Signature Scheme,LiBin/South China University of Technology,0/75
  4. The Research of Authentication Protocol in LTE-R,FangYanHua/Lanzhou Jiaotong University,0/0
  5. Several Classes of Cryptosystems Based on Groups,KongJing/Hangzhou University of Electronic Science and Technology,0/24
  6. The secret of the affine transformation and the zero knowledge proof of multivariable proxy signature scheme based on,LiZhiXing/Nanjing University of Technology and Engineering,0/31
  7. The Study of the REESSE1+Public Key Encryption Scheme Based on IBE,ChenJianKang/Beijing University of Technology,0/1
  8. Research of Key Agreement Protocol Based on Certificateless Cryptosystem,TanHongLian/West China University,0/0
  9. A Research on the Cryptography Based on Elliptic Curve Isogenies,HuJin/Wuhan University,0/25
  10. Research of Mutualauthentication Protocol for RFID Based on LDPC Code and McEliece Public Key Cryptosystem,YangBin/South China University of Technology,0/14
  11. The Research of RSA Algorithm and the Design of ASIC,ZhangPeng/Xi'an University of Electronic Science and Technology,0/11
  12. Cryptanalysis of Severalmultivariate Public Key Cryptosystems,XuZhaoHu/University of Electronic Science and Technology,0/12
  13. Research on Certificateless Threshold Proxy Re-signature in the Standard Model,ZhangYue/Xi'an University of Electronic Science and Technology,0/22
  14. The Design and Optimization of High-Speed Parallel Hardwares for Mulitvairate Public Key Cryptosystem,ChenGuoMin/South China University of Technology,0/27
  15. Probabilistic Cryptosystem Based on Public Key Encryption,LiXiangQian/Southwest Jiaotong University,0/37
  16. Design and Application of Some Cryptographic Mechanisms Using Non-commutative Structures,DanBaoYu/Yunnan University,0/42
  17. Research of Public-Key Cryptosystems Based on Hard Problems in Lattice,WuYanFang/Beijing University of Posts and Telecommunications,0/50
  18. Public Key Cryptosystem Based on Lucas Sequences,LiZhiHui/Beijing University of Posts and Telecommunications,0/71
  19. Study on Theory and Applications of Certificateless Public Key Cryptosystem,ZhangManJun/Xi'an University of Electronic Science and Technology,0/104
  20. Some Applications of Parallel Computing in Information Security,SongLi/Yunnan University,0/122
  21. Research of Mutual Authentication Protocol for RFID Based on Hash Function and Public Key,LiangHuanZuo/South China University of Technology,0/236
  22. Research on Security Proof for Public-key Cryptosystems,LiuJie/Shanghai Jiaotong University,1/743
  23. Some Arithmetic Problems in Finite Fields,CaoZuo/Sichuan University,1/278
  24. Broadcast Encryption and Traitor Tracing with the Application in Electronic Commerce,LvXiXiang/Xi'an University of Electronic Science and Technology,1/315
  25. Research on Braid Group Public Key Cryptosystems and Quantum Cryptanalysis,TangXueMing/Huazhong University of Science and Technology,0/301
  26. Research and Implementation on Key Technologies of Programmable Cryptographic Processors,ZhaoXueMi/National University of Defense Science and Technology,2/254
  27. Research on Key Technologies of Cipher Theory,ZhuBaoPing/Nanjing University of Technology and Engineering,0/367
  28. Design and Analysis of Several Classes of Fast Public Key Cryptosystems,WangBaoCang/Xi'an University of Electronic Science and Technology,0/448
  29. The Conic Curves over Z_n and Its Applications in Public-Key Cryptosystem,WangBiao/Sichuan University,6/403
  30. Study on the Public Key Cryptosystem Secure Against Chosen Ciphertext Attack,MeiQiXiang/Southwest Jiaotong University,3/365
  31. Research on the Anonymity Problem in the Public-key Cryptosystem,WangJiLin/Xi'an University of Electronic Science and Technology,4/310
  32. Study on Authentication Protocol for Personal Communication Security,TangJinSong/Zhejiang University,6/305
  33. A Study of Some Arithmetic Problems of Elliptic Curves over Finite Fields,YuFei/University of Science and Technology of China,5/193
  34. Analysis and Design of Group Key Agreement Protocol,LiGuoMin/Southwest Jiaotong University,3/268
  35. Security Technology for E-passport Based on Identity-Based Public Key Cryptography,LiChengHua/Huazhong University of Science and Technology,1/162
  36. Research on Image Digital Watermarking Based on Copyright Protection,XuWenLi/Xi'an University of Electronic Science and Technology,11/1116
  37. Analysis and Design for Cryptographic Technique Based on Error Correcting Codes,ZhangYing/Dalian Maritime University,0/155
  38. Research on the Applications of Several NP Problems and Cryptography Problems Based on DNA Self-assembly,ChengZhen/Huazhong University of Science and Technology,0/168
  39. Research on the Design and Applications of Algorithmic Tile Assembly Systems,HuangYuFang/Huazhong University of Science and Technology,0/55
  40. Research on Two-Party Authenticated Key Agreement Protocols in Identity and Certificateless Based Public Key Cryptography,HouMengBo/Shandong University,3/379
  41. No certificate's public key cryptosystem Some Issues,SangYongXuan/Xiamen University,4/360
  42. Research on Theory of Digital Signature with Special Properties,XiaXiangSheng/Huazhong University of Science and Technology,0/259
  43. Research into Several Issues in Code-based Post-Quantum Public Key Cryptography,HanMou/Nanjing University of Technology and Engineering,2/164
  44. Extended MQ cryptosystem tectonic theory research,WangHouZhen/Wuhan University,0/170
  45. Research on Certificateless Public Key Cryptography Without Bilinear Pairing,LiuWenHao/University of Electronic Science and Technology,0/299
  46. Study on Public Key Cryptographic Schemes Based on Multivariate Polynomials,WangZuo/Xi'an University of Electronic Science and Technology,1/195
  47. Study of Provably Secure Public Key Cryptosystems in the Standard Model,LiuZhenHua/Xi'an University of Electronic Science and Technology,1/243
  48. Study on the Proveable Security Identity Related Public Key Cryptosystem,KangLi/Southwest Jiaotong University,1/168
  49. Research on the Key Escrow Problem in Identity Based Cryptosystem,JinZhengPing/Beijing University of Posts and Telecommunications,1/139
  50. Private Matching Based on IBE and Its Application in Ad Hoc Networks,WuZhongSheng/Fujian Normal University,0/58

Total 4 Pages First Previous 1 2 3 4 Next Last

© 2012 www.DissertationTopic.Net  Mobile