善辩 发表于 2025-3-26 22:11:47

https://doi.org/10.1007/978-3-658-06265-1. In this chapter we shall first give a formal introduction to secret-key and public-key cryptography, and then discuss the most influential and useful secret-key cryptosystems, from both a historical and a cyberspace perspective.

Alopecia-Areata 发表于 2025-3-27 05:11:19

http://reply.papertrans.cn/25/2419/241862/241862_32.png

失望未来 发表于 2025-3-27 07:11:18

http://reply.papertrans.cn/25/2419/241862/241862_33.png

纬度 发表于 2025-3-27 11:54:22

Petra Jansen,Florian Seidl,Stefanie Richter system based on ECDLP. In this chapter we shall first discuss the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the classical solutions to ECDLP, then we shall present some popular and useful ECDLP based cryptographic systems and protocols. Finally, we shall giver an account of quantum cryp

哀悼 发表于 2025-3-27 14:15:51

https://doi.org/10.1007/978-3-662-57854-4ctoring, logarithms and elliptic curves such as RSA, DHM and ECC are efficient, secure and practical but not quantum resistant. Once a practical quantum computer can be built and made available in the market, they will be no more secure, and there is a need to make an immediate transition of these e

Platelet 发表于 2025-3-27 18:07:13

http://reply.papertrans.cn/25/2419/241862/241862_36.png

希望 发表于 2025-3-27 23:06:40

http://reply.papertrans.cn/25/2419/241862/241862_37.png

碌碌之人 发表于 2025-3-28 05:52:38

http://reply.papertrans.cn/25/2419/241862/241862_38.png

修饰语 发表于 2025-3-28 09:42:43

http://reply.papertrans.cn/25/2419/241862/241862_39.png

evanescent 发表于 2025-3-28 10:58:01

http://reply.papertrans.cn/25/2419/241862/241862_40.png
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Cybercryptography: Applicable Cryptography for Cyberspace Security; Song Y. Yan Book 2019 Springer Nature Switzerland AG 2019 Cyberspace a