About 19 item dissertation in line with authenticated encryption query results,the following is 1 to 50(Search took 0.067 seconds)

  1. Reasearch on the Authenticated Encryption Technogy in CCSDS,YangYaHui/Shenyang Aerospace University,0/70
  2. Research on Complex Digital Signature Schemes and Security Authentication,ShiRongHua/Central South University,1/271
  3. Study on Analysis, Design and Applications of Signcryption Schemes,ZhangChuanRong/Xi'an University of Electronic Science and Technology,3/386
  4. Research about the the group signature special group signature scheme,XieZuo/Zhejiang University,1/241
  5. Signatures with Additional Properties and Its Applications,FuXiaoTong/Xi'an University of Electronic Science and Technology,11/479
  6. Research of Several Problems of Digital Signature and Authenticated Encryption,ZhangZhang/Xi'an University of Electronic Science and Technology,5/723
  7. Study of Several Threshold Cryptography Mechanisms,GuoCheng/Dalian University of Technology,0/208
  8. Research and Design on Some Security Protocols,LiYanPing/Xi'an University of Electronic Science and Technology,3/295
  9. Research on Threshold Cryptography Related Technology,ZhouYouSheng/Beijing University of Posts and Telecommunications,0/107
  10. Research on Passive Optical Network Security Technologies and Key Algorithms,ShouGuoChu/Beijing University of Posts and Telecommunications,0/73
  11. Research on Chaos-based Pseudo Random Number Generator and Its Application on Image Encryption,QiuJin/Chongqing University,0/222
  12. A New Identity-based Authenticated Encryption Scheme,HuangYiShuan/Jinan University,5/241
  13. The Study and Applications of the Convertible Authenticated Encryption Schemes,LiXuHong/Shandong Normal University,0/49
  14. A New Authentication Encryption Scheme Based on Multi-prime RSA,ZhangLei/Jinan University,0/220
  15. ECC fast algorithm and signature scheme,ZhuXiaoJian/Northwestern Polytechnical University,1/163
  16. The Improvement and Implementation of an Identity-Based Authenticated Encryption Scheme,CaiYanTao/Jinan University,1/162
  17. Analysis and Design of Digital Signatures Based on Elliptic Curve Cryptography,JiaLiang/University of North,2/115
  18. Research and Implementation of FPGA- GCM encryption and authentication algorithms,QuShanXin/Beijing University of Posts and Telecommunications,0/39
  19. Several Digital Signature Scheme Algorithm Design,SunJinQing/Northeastern University,0/53

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile