书籍详情
信息安全和密码学
作者:林东岱 等主编
出版社:科学出版社
出版时间:2009-06-01
ISBN:9787030246158
定价:¥50.00
购买这本书可以去
内容简介
本书是2008年12月在北京召开的第四届中国密码学与信息安全国际会议(The 4th China International Conference on InformarionSecurity and Cryptology-Inscrypt 2008)的短文论文集。Inscrypt系列国际会议是由信息安全国家重点实验室发起,与中国密码学会联合举办的高水平国际会议,每年在中国举办一次,该会议论文集由Springer出版社出版。本书收录了这次会议的短文12篇。主要内容包括密码算法、数字签名与认证、安全协议、密码实现与应用等。本书可供从事密码学、信息安全、通信与信息系统、计算机应用技术等专业的科技人员和高等院校师生参考。
作者简介
暂缺《信息安全和密码学》作者简介
目录
I Stream Cipher and Elliptic Curve Algorithm
Cryptanalysis of Generalized Self-shrinking Generator
Fast Scalar Multiplication on a Family of Supersingular Curves over IF2m
II Digital Signature and Authentication Scheme
An Efficient Proxy Signature Scheme without Random Oracle Model
Provable Secure Signature Scheme with Partial Sanitization and Disclosure "
An Evaluation of Improvement Scheme for Boundary Problem in
Cancelable Biometrics Based on Block Scramble
III Key Management Protocols
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
New Two-Party Identity-based Authenticated Key Agreement Protocol without Random Oracles
A Multilevel Secure Key Predistribution Scheme.in Wireless Sensor Networks
IV Hardware Implementation and Side Channel Attack
FPGA & ASIC hnplementation of Differential Power:Analysis Attack on AES
……
V Applications and Steganography
Author Index
Cryptanalysis of Generalized Self-shrinking Generator
Fast Scalar Multiplication on a Family of Supersingular Curves over IF2m
II Digital Signature and Authentication Scheme
An Efficient Proxy Signature Scheme without Random Oracle Model
Provable Secure Signature Scheme with Partial Sanitization and Disclosure "
An Evaluation of Improvement Scheme for Boundary Problem in
Cancelable Biometrics Based on Block Scramble
III Key Management Protocols
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
New Two-Party Identity-based Authenticated Key Agreement Protocol without Random Oracles
A Multilevel Secure Key Predistribution Scheme.in Wireless Sensor Networks
IV Hardware Implementation and Side Channel Attack
FPGA & ASIC hnplementation of Differential Power:Analysis Attack on AES
……
V Applications and Steganography
Author Index
猜您喜欢