About 140 item dissertation in line with public-key cryptography query results,the following is 1 to 50(Search took 0.062 seconds)

  1. Research of Anti-collision Algorithm and Security Protocol in RFID Systems,XiaoFeng/Beijing Institute of Technology,0/69
  2. Design for Unified Architecture ECC and RSA Cryptographic Processor,LiuBing/Tianjin University,0/1
  3. An Research on RSA-Based Probabilistic Public Key Encryption Scheme,LiZuoQi/Central South University,0/12
  4. Research and design on proxy signature scheme,YangLi/Shaanxi Normal University,0/37
  5. The Research About Algorithm of Point Plus and Double Point on Elliptic Curve,SongChunYu/Northwest University for Nationalities,0/16
  6. Research on threshold signature,XieJunQin/Shaanxi Normal University,0/33
  7. Research on Some Elliptic Curve Cryptographic Algorithms,YuWei/University of Science and Technology of China,0/85
  8. Research on3G-WLAN Interworking Security from Certificateless Public Key Cryptography,CuiFang/Xi'an University of Electronic Science and Technology,0/47
  9. Research and Implementation on Public-Key Based RFID Authentication Technology,ChenZhiYi/Xi'an University of Electronic Science and Technology,1/99
  10. Study on Fragile Image Watermarking Based on Public Key Cryptography and Hash Function,TaoLi/Southwest Jiaotong University,0/29
  11. Some Public Key Cryptography Schemes Based on Cubic Residues,XingDongSheng/Shanghai Jiaotong University,0/36
  12. Implementation and Application of Dynamic One-way Trapdoor Function,QuPengCheng/Jilin University,1/17
  13. Some Public Key Cryptography Schemes Based on Quartic Residues,GuoHao/Shanghai Jiaotong University,0/17
  14. Research on Some Topics of Threshold Cryptography with Non-trusted Dealer,ShiXianZhi/Fujian Normal University,0/1
  15. Study on Key Management Schemes for Wireless Sensor Network,JiangQiongXi/Nanchang University,0/64
  16. Research on a Public Key Cryptographic System with Digital Signature,JiangCai/Northeastern University,0/19
  17. Implementation and Application of HFMS in Real Number Field,SuJinZuo/Jilin University,0/6
  18. Nondeterministic Plaintext Space Public Key Cryptosystem and Its Implementaiton,ZhaoQing/Jilin University,0/7
  19. The Research on Certificateless Signature Scheme Without Bilinear Pairing,WangZuo/Changsha University of Science and Technology,0/7
  20. Design and Implementation of Probabilistic MPKC,DongHaoJun/Jilin University,0/14
  21. Study on non threshold proxy signature certificate,CaoTianQing/Shaanxi Normal University,0/19
  22. Research on Certificateless Key Management in MANET,ZhengHuanHuan/Xi'an University of Electronic Science and Technology,0/29
  23. Research on Efficient On-line/Off-line Signcryption without Key Exposure,YanZuo/Xi'an University of Electronic Science and Technology,0/27
  24. Several threshold signature scheme based on identity,GaoHuanHuan/Shaanxi Normal University,0/26
  25. The Analysis, Design and Application of Certificateless Digital Signature,JuLinNa/Xi'an University of Electronic Science and Technology,0/43
  26. Probabilistic Cryptosystem Based on Public Key Encryption,LiXiangQian/Southwest Jiaotong University,0/37
  27. Analysis and Design on Certificateless Digital Signature Schemes,GuoLingLing/Fujian Normal University,0/44
  28. Certificateless Authenticated Group Key Agreement Protocol Research,YangXianBo/Zhejiang Technology and Business University,0/32
  29. Hard Problems in Lattice-based Cryptosystems,LiuMingJie/Tsinghua University,0/190
  30. Research on Security and Applications of Threshold Cryptosystem,ChaiZhenChuan/Shanghai Jiaotong University,7/568
  31. Design and Analysis of Cryptographic Schemes Based on Braid Groups,WangLiCheng/Shanghai Jiaotong University,4/318
  32. Design and Analysis of Proxy Signature and Group Signature,LuRongBo/Southwest Jiaotong University,2/454
  33. The study of mobile ad hoc network security issues,ZhangWeiChao/University of Science and Technology of China,1/428
  34. Resourch on Algorithms and Applications of Public Key Cryptography Used in Ubiquitous Computing Systems,LiBin/Northwestern University,2/337
  35. Lattice Reduction Theory and Its Applications to Cipher Design,YuWeiChi/Southwest Jiaotong University,6/582
  36. The Research of General Parallel Vector Crypto Coprocessor,NiXiaoQiang/National University of Defense Science and Technology,4/213
  37. Design and Analysis of Security Protocol,TongHuaZhang/Zhejiang University,4/531
  38. Chip Implementation and It’s Security Defence for Elliptic Curve Cryptosystems over GF(2~m),DanYongPing/Huazhong University of Science and Technology,3/269
  39. The Research on Digital Signature Schemes,WangShaoHui/Shandong University,5/1044
  40. Simplified Design for Cryptographic Algorithms and Protocols,WeiPuWen/Shandong University,0/280
  41. Provably secure public key encryption and public key encryption without certificate of,LaiJunZuo/Shanghai Jiaotong University,0/354
  42. Cryptanalysis of RSA and Knapsack Public Key Cryptosystem,HanLiDong/Shandong University,1/564
  43. Research on Cryptosystems and Key Agreement Protocols from Bilinear Pairings,WangShengBao/Shanghai Jiaotong University,3/396
  44. Research on Some Problems of Public-key Cryptography,FuZhiGuo/Jilin University,1/227
  45. Research on the Multifactor Fuzzy Trust Model on P2P Networks,LinHuaiQing/Huazhong University of Science and Technology,2/369
  46. Design and Analysis of Multivariate Public Key Cryptosystem,YuanFeng/Xi'an University of Electronic Science and Technology,0/40
  47. Research on Certificateless Public Key Cryptography Based on ECC,ZhangRui/Wuhan University,0/172
  48. Research on Identity-Based Public-Key Cryptography,ZhangNing/Beijing University of Posts and Telecommunications,0/236
  49. Identity-based encryption systems PKG Implementation and Security Analysis,WangJinLing/Jilin University,4/145
  50. Research and Application of the Security Mechanisms in DTV System,CaoYongQuan/Beijing University of Posts and Telecommunications,0/84

Total 3 Pages First Previous 1 2 3 Next Last

© 2012 www.DissertationTopic.Net  Mobile