火车车轮 发表于 2025-3-25 06:41:55

http://reply.papertrans.cn/25/2419/241862/241862_21.png

压碎 发表于 2025-3-25 09:11:36

http://reply.papertrans.cn/25/2419/241862/241862_22.png

dissent 发表于 2025-3-25 13:58:15

Secret-Key Cryptography,. In this chapter we shall first give a formal introduction to secret-key and public-key cryptography, and then discuss the most influential and useful secret-key cryptosystems, from both a historical and a cyberspace perspective.

CRP743 发表于 2025-3-25 16:53:45

Elliptic Curve Cryptography, system based on ECDLP. In this chapter we shall first discuss the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the classical solutions to ECDLP, then we shall present some popular and useful ECDLP based cryptographic systems and protocols. Finally, we shall giver an account of quantum cryptanalysis of ECDLP-based cryptography.

摘要记录 发表于 2025-3-25 20:07:57

http://reply.papertrans.cn/25/2419/241862/241862_25.png

fixed-joint 发表于 2025-3-26 00:58:21

https://doi.org/10.1007/978-3-658-06243-9Cryptography is intimately connected to mathematics, in fact, the construction and the security of many cryptographic schemes and protocols depend heavily on some deep ideas and sophisticated techniques in mathematics, particularly in the theory of numbers.

thalamus 发表于 2025-3-26 06:06:17

http://reply.papertrans.cn/25/2419/241862/241862_27.png

V洗浴 发表于 2025-3-26 10:08:48

http://reply.papertrans.cn/25/2419/241862/241862_28.png

天气 发表于 2025-3-26 16:31:59

Mathematical Preliminaries,Cryptography is intimately connected to mathematics, in fact, the construction and the security of many cryptographic schemes and protocols depend heavily on some deep ideas and sophisticated techniques in mathematics, particularly in the theory of numbers.

精致 发表于 2025-3-26 16:57:17

http://reply.papertrans.cn/25/2419/241862/241862_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Cybercryptography: Applicable Cryptography for Cyberspace Security; Song Y. Yan Book 2019 Springer Nature Switzerland AG 2019 Cyberspace a