剥削 发表于 2025-3-23 11:18:39
Book 2019sists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively.. Chapters 4 discusses the basic ideas and system of secret-key cryATOPY 发表于 2025-3-23 14:40:59
Quantum Safe Cryptography,xisting cryptographic systems to quantum resistant cryptographic systems. In this last chapter of the book, we shall introduce some of the cryptographic systems including lattice based and coding based cryptographic systems that resist all known quantum-computing attacks.MERIT 发表于 2025-3-23 18:13:24
https://doi.org/10.1007/978-3-658-06265-1graphic systems and protocols whose security depends on the intractability of the DLP problem. Finally, we shall discuss a quantum approach to attack both the DLP problem and the DLP-based cryptography.Ganglion 发表于 2025-3-23 23:46:42
http://reply.papertrans.cn/25/2419/241862/241862_14.png污点 发表于 2025-3-24 02:58:43
Secret-Key Cryptography,. In this chapter we shall first give a formal introduction to secret-key and public-key cryptography, and then discuss the most influential and useful secret-key cryptosystems, from both a historical and a cyberspace perspective.Malleable 发表于 2025-3-24 06:55:44
Factoring Based Cryptography,tractability of this factoring problem is surprisingly has an ingenious application in cryptography, in fact, the security of the first, most famous and widely used public-key cryptography RSA relies exactly on the intractability the integer factorization problem. I this chapter we discuss various f防水 发表于 2025-3-24 14:44:00
http://reply.papertrans.cn/25/2419/241862/241862_17.pngHorizon 发表于 2025-3-24 15:56:05
http://reply.papertrans.cn/25/2419/241862/241862_18.png信任 发表于 2025-3-24 22:41:22
http://reply.papertrans.cn/25/2419/241862/241862_19.pngNausea 发表于 2025-3-25 00:08:19
Offensive Cryptography,llegally used by criminals to attack the cyberspace or to do some illegal activities in cyberspace; in this case cryptography (particularly when it takes the advantage of trojan horses, worms, and back doors) becomes a dangerous attack to the cyberspace. In this last chapter of the book, we shall di