membrane 发表于 2025-3-26 21:17:16

Discrete Logarithms,In this chapter, we discuss the difficulty of the discrete logarithm problem (DL problem). The security of many public-key cryptosystems is based on the difficulty of this problem. An example is the ElGamal cryptosystem (see Section 7.5).

刚毅 发表于 2025-3-27 02:32:10

http://reply.papertrans.cn/48/4736/473582/473582_32.png

FORGO 发表于 2025-3-27 08:22:32

Digital Signatures,Digital signatures are used to sign electronic documents. Such signatures have properties similar to handwritten signatures. We will briefly describe those properties here.

完整 发表于 2025-3-27 11:51:23

Other Groups,As we have described in Sections 7.4.4 and 11.4.8, the ElGamal cryptosystem and signature scheme can be implemented in groups in which the discrete logarithm problem is hard to solve. In this chapter, we describe a few possible groups. For more details, we refer the reader to the literature, for example to .

施舍 发表于 2025-3-27 13:50:06

Identification,In the previous chapters, two important basic mechanisms have been explained: encryption and digital signatures. In this chapter we describe a third basic technique: identification.

Creatinine-Test 发表于 2025-3-27 18:43:57

0172-6056 Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete

虚情假意 发表于 2025-3-28 01:04:56

http://reply.papertrans.cn/48/4736/473582/473582_37.png

NICE 发表于 2025-3-28 05:00:03

http://reply.papertrans.cn/48/4736/473582/473582_38.png

过分 发表于 2025-3-28 09:26:15

d different operating system configurations and communication concepts be compared at a very early project phase, before the hardware is even available? Or perhaps there is a first version of the software running, but it still suffers from unresolved sporadic problems that need to be investigated? O

Atrium 发表于 2025-3-28 14:11:09

http://reply.papertrans.cn/48/4736/473582/473582_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Introduction to Cryptography; Johannes A. Buchmann Textbook 20011st edition Springer-Verlag New York, Inc. 2001 Euclidean algorithm.Micros