About

- The Improved Public-key Encryption Algorithm Based on Finite Field Chebyshev Polynomial and RSA Cryptosystem,TanZuGang/Central South University,0/3
- Research on Certiifcateless Proxy Re-signature Basd on Cetrificateless Public Cryptosystem,LiangYiZuo/Lanzhou University of Technology,0/45
- Investigations of Power Analysis Attacks on Cryptographic Hardware of Rainbow Signature Scheme,LiBin/South China University of Technology,0/75
- The Research of Authentication Protocol in LTE-R,FangYanHua/Lanzhou Jiaotong University,0/0
- Several Classes of Cryptosystems Based on Groups,KongJing/Hangzhou University of Electronic Science and Technology,0/24
- The secret of the affine transformation and the zero knowledge proof of multivariable proxy signature scheme based on,LiZhiXing/Nanjing University of Technology and Engineering,0/31
- The Study of the REESSE1+Public Key Encryption Scheme Based on IBE,ChenJianKang/Beijing University of Technology,0/1
- Research of Key Agreement Protocol Based on Certificateless Cryptosystem,TanHongLian/West China University,0/0
- A Research on the Cryptography Based on Elliptic Curve Isogenies,HuJin/Wuhan University,0/25
- Research of Mutualauthentication Protocol for RFID Based on LDPC Code and McEliece Public Key Cryptosystem,YangBin/South China University of Technology,0/14
- The Research of RSA Algorithm and the Design of ASIC,ZhangPeng/Xi'an University of Electronic Science and Technology,0/11
- Cryptanalysis of Severalmultivariate Public Key Cryptosystems,XuZhaoHu/University of Electronic Science and Technology,0/12
- Research on Certificateless Threshold Proxy Re-signature in the Standard Model,ZhangYue/Xi'an University of Electronic Science and Technology,0/22
- The Design and Optimization of High-Speed Parallel Hardwares for Mulitvairate Public Key Cryptosystem,ChenGuoMin/South China University of Technology,0/27
- Probabilistic Cryptosystem Based on Public Key Encryption,LiXiangQian/Southwest Jiaotong University,0/37
- Design and Application of Some Cryptographic Mechanisms Using Non-commutative Structures,DanBaoYu/Yunnan University,0/42
- Research of Public-Key Cryptosystems Based on Hard Problems in Lattice,WuYanFang/Beijing University of Posts and Telecommunications,0/50
- Public Key Cryptosystem Based on Lucas Sequences,LiZhiHui/Beijing University of Posts and Telecommunications,0/71
- Study on Theory and Applications of Certificateless Public Key Cryptosystem,ZhangManJun/Xi'an University of Electronic Science and Technology,0/104
- Some Applications of Parallel Computing in Information Security,SongLi/Yunnan University,0/122
- Research of Mutual Authentication Protocol for RFID Based on Hash Function and Public Key,LiangHuanZuo/South China University of Technology,0/236
- Research on Security Proof for Public-key Cryptosystems,LiuJie/Shanghai Jiaotong University,1/743
- Some Arithmetic Problems in Finite Fields,CaoZuo/Sichuan University,1/278
- Broadcast Encryption and Traitor Tracing with the Application in Electronic Commerce,LvXiXiang/Xi'an University of Electronic Science and Technology,1/315
- Research on Braid Group Public Key Cryptosystems and Quantum Cryptanalysis,TangXueMing/Huazhong University of Science and Technology,0/301
- Research and Implementation on Key Technologies of Programmable Cryptographic Processors,ZhaoXueMi/National University of Defense Science and Technology,2/254
- Research on Key Technologies of Cipher Theory,ZhuBaoPing/Nanjing University of Technology and Engineering,0/367
- Design and Analysis of Several Classes of Fast Public Key Cryptosystems,WangBaoCang/Xi'an University of Electronic Science and Technology,0/448
- The Conic Curves over Z_n and Its Applications in Public-Key Cryptosystem,WangBiao/Sichuan University,6/403
- Study on the Public Key Cryptosystem Secure Against Chosen Ciphertext Attack,MeiQiXiang/Southwest Jiaotong University,3/365
- Research on the Anonymity Problem in the Public-key Cryptosystem,WangJiLin/Xi'an University of Electronic Science and Technology,4/310
- Study on Authentication Protocol for Personal Communication Security,TangJinSong/Zhejiang University,6/305
- A Study of Some Arithmetic Problems of Elliptic Curves over Finite Fields,YuFei/University of Science and Technology of China,5/193
- Analysis and Design of Group Key Agreement Protocol,LiGuoMin/Southwest Jiaotong University,3/268
- Security Technology for E-passport Based on Identity-Based Public Key Cryptography,LiChengHua/Huazhong University of Science and Technology,1/162
- Research on Image Digital Watermarking Based on Copyright Protection,XuWenLi/Xi'an University of Electronic Science and Technology,11/1116
- Analysis and Design for Cryptographic Technique Based on Error Correcting Codes,ZhangYing/Dalian Maritime University,0/155
- Research on the Applications of Several NP Problems and Cryptography Problems Based on DNA Self-assembly,ChengZhen/Huazhong University of Science and Technology,0/168
- Research on the Design and Applications of Algorithmic Tile Assembly Systems,HuangYuFang/Huazhong University of Science and Technology,0/55
- Research on Two-Party Authenticated Key Agreement Protocols in Identity and Certificateless Based Public Key Cryptography,HouMengBo/Shandong University,3/379
- No certificate's public key cryptosystem Some Issues,SangYongXuan/Xiamen University,4/360
- Research on Theory of Digital Signature with Special Properties,XiaXiangSheng/Huazhong University of Science and Technology,0/259
- Research into Several Issues in Code-based Post-Quantum Public Key Cryptography,HanMou/Nanjing University of Technology and Engineering,2/164
- Extended MQ cryptosystem tectonic theory research,WangHouZhen/Wuhan University,0/170
- Research on Certificateless Public Key Cryptography Without Bilinear Pairing,LiuWenHao/University of Electronic Science and Technology,0/299
- Study on Public Key Cryptographic Schemes Based on Multivariate Polynomials,WangZuo/Xi'an University of Electronic Science and Technology,1/195
- Study of Provably Secure Public Key Cryptosystems in the Standard Model,LiuZhenHua/Xi'an University of Electronic Science and Technology,1/243
- Study on the Proveable Security Identity Related Public Key Cryptosystem,KangLi/Southwest Jiaotong University,1/168
- Research on the Key Escrow Problem in Identity Based Cryptosystem,JinZhengPing/Beijing University of Posts and Telecommunications,1/139
- Private Matching Based on IBE and Its Application in Ad Hoc Networks,WuZhongSheng/Fujian Normal University,0/58

Total 4 Pages First Previous

© 2012 www.DissertationTopic.Net Mobile