教學課程
近代電腦密碼學 (2003)
上一頁
日期
授課內容
2002-12-24
Efficient.ppt
2002-2-1
09_MAKEP.ppt
2002-2-1
linux-507.tar.gz
2002-2-1
phpmailer.zip
2002-2-1
vimrc
2003-10-30
chapter3-1.ppt
2003-10-30
chapter3-2.ppt
2003-10-30
chapter4(signature).ppt
2003-11-10
Chapter 6.ppt
2003-11-10
Chapter5.ppt
2003-11-10
chapter4(signature).ppt
2003-11-12
2_Chapter5.ppt
2003-11-12
Chapter3.rar
2003-11-12
Chapter5.ppt
2003-11-12
b.ppt
2003-11-12
chapter4(signature).ppt
2003-11-13
2_Chapter5.ppt
2003-11-13
Chapter5.ppt
2003-11-13
pu_note.txt
2003-11-14
Chapter 6.ppt
2003-11-15
note.doc
2003-11-17
Remarks on unknown key-share attack on authenticated.ppt
2003-11-17
multisignature.ppt
2003-11-19
2_Digital signature schemes based on factoring and discrete logarithms.ppt
2003-11-19
Digital signature schemes based on factoring and discrete logarithms.ppt
2003-11-19
Digital signature schemes based on factoring and discrete logarithms_2.ppt
2003-11-19
Digital signature schemes based on factoring and discrete logarithms_3.ppt
2003-11-24
09MAKEP.ppt
2003-11-24
09MAKEPlp .ppt
2003-11-24
2_Improved Yen-Joye
2003-11-24
2_Unknown Key-share attack on authenticated multiple-key agreement protocol .ppt
2003-11-24
9.ppt
2003-11-24
Improved Yen-Joye
2003-11-24
Unknown Key-share attack on authenticated multiple-key agreement protocol .ppt
2003-11-24
Unknown Key-share attack on authenticated multiple-key agreement protocol(new).ppt
2003-11-24
multiple key agreement protocol.ppt
2003-11-3
attention.doc
2003-11-3
group-list.xls
2003-11-3
注意事項.doc
2003-11-3
報告組別.xls
2003-11-4
Chapter5.ppt
2003-12-1
2_A practical (t, n) threshold.ppt
2003-12-1
A practical (t, n) threshold.ppt
2003-12-1
c.ppt
2003-12-1
score.xls
2003-12-10
Security Enhancement for Optimal Strong-Password Authentication Protocol.ppt
2003-12-22
A Flexible Remote User Authentication Scheme Using Smart Cards.ppt
2003-12-22
b.ppt
2003-12-22
cryptography 1222.ppt
2003-12-24
Efficient.ppt
2003-12-29
Efficient.ppt
2003-12-29
security project14.ppt
2003-12-29
密碼學project.ppt
2003-12-3
Proxy Blind Singnature .ppt
2003-12-8
2_Publicly verifiable authenticated encryption.ppt
2003-12-8
A practical (t, n) threshold.ppt
2003-12-8
Publicly verifiable authenticated encryption.ppt
2003-2-1
vimrc
2003-3-10
Ch06.ppt
2003-3-11
Ch07.ppt
2003-3-12
Ch08.ppt
2003-3-13
Ch09.ppt
2003-3-14
Ch10.ppt
2003-3-15
Ch11.ppt
2003-3-16
Ch12.ppt
2003-3-17
Ch13.ppt
2003-3-19
Ch14.ppt
2003-3-5
Ch01.ppt
2003-3-6
Ch02.ppt
2003-3-7
Ch03.ppt
2003-3-8
Ch04.ppt
2003-3-9
Ch05.ppt
2003-9-15
2_chapter2.ppt
2003-9-15
chapter1.ppt
2003-9-15
chapter2.ppt
2003-9-15
chapter3.ppt
2003-9-22
2_chapter1.ppt
2003-9-22
chapter1-1.ppt
2003-9-22
chapter1.ppt
2003-9-24
2_chapter1-1.ppt
2003-9-24
chapter1-1.ppt
2003-9-24
chapter2.ppt
2003-9-24
chapter3-1.ppt
2003-9-24
chapter3-2.ppt
2003-9-29
chapter1-1.ppt
2003-9-29
chapter2.ppt
2003-9-29
chapter3-2.ppt
2004-1-1
final.doc
2004-1-9
list.xls
2004-4-23
bnc
2004-4-23
d2
2004-4-23
space