close
Hybrid CryptoSystem相關網站Secure Hybrid Encryption from Weakened Key Encapsulation:http://homepages.cwi.nl/~kiltz/papers/hybrid.pdfCrypto system Math:http://www.math.clemson.edu/faculty/Gao/crypto_mod/Hybrid CryptoSystem Intro:http://en.citizendium.org/wiki/Hybrid_cryptosystemRFC 3766 Determining Strengths For Public Keys Used For Exchanging Symmetric Keys http://tools.ietf.org/html/rfc3766An introduction to Cryptography:http://www.foo.be/gnupg/gnupg.pdfA Hybrid Approach for Face Template Protection:http://biometrics.cse.msu.edu/Publications/SecureBiometrics/FengYuenJainHybridFaceSPIE08.pdfSymmetric Subgroup Membership Problems:http://www.iacr.org/archive/pkc2005/33860105/33860105.pdfPGP Intro :http://www.ics.uci.edu/~asarma/243d/PGP.htmlA CRYPTOGRAPHIC STUDY OF SOME DIGITAL SIGNATURE SCHEMES:http://cogprints.org/4013/1/Ph.D._Thesis__Manoj_Kuamr.pdfPC-Based Access Control System:http://www.waset.org/pwaset/v38/v38-201.pdfiKey 2032 Security Policy:http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp161.pdfSignaSURE? Security Policy:http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp094.pdfIntroduction to Public Key Cryptology Classical Cryptology:http://www.nku.edu/~christensen/section%2021%20intro%20to%20public%20key.pdfKnapsack Cryptosystems: The Past and the Future:http://www.ics.uci.edu/~mingl/knapsack.htmlFujisaki-Okamoto Hybrid EncryptionRevisited:http://www.dgalindo.es/FOfinalIJIS.pdfHybrid Damg°ard Is CCA1-Secure under the DDHAssumption:http://ufr6.univ-paris8.fr/maths/phan/2008_cans.pdfModern Cryptography: Theory and Applications:http://www-cs-faculty.stanford.edu/~eroberts/courses/soco/projects/2004-05/cryptography/pgp.htmlCryptovirology FAQ :http://www.cryptovirology.com/cryptovfiles/cryptovirologyfaqver1.htmlPublic and Private Key Protocols:http://www.maths.usyd.edu.au/u/kohel/tch/MATH3024/Lectures/lectures_08.pdf .msgcontent .wsharing ul li { text-indent: 0; } 分享 Facebook Plurk YAHOO! .
全站熱搜
留言列表