教學課程
近代電腦密碼學 (2003)
上一頁
日期授課內容
2002-12-24Efficient.ppt
2002-2-109_MAKEP.ppt
2002-2-1linux-507.tar.gz
2002-2-1phpmailer.zip
2002-2-1vimrc
2003-10-30chapter3-1.ppt
2003-10-30chapter3-2.ppt
2003-10-30chapter4(signature).ppt
2003-11-10Chapter 6.ppt
2003-11-10Chapter5.ppt
2003-11-10chapter4(signature).ppt
2003-11-122_Chapter5.ppt
2003-11-12Chapter3.rar
2003-11-12Chapter5.ppt
2003-11-12b.ppt
2003-11-12chapter4(signature).ppt
2003-11-132_Chapter5.ppt
2003-11-13Chapter5.ppt
2003-11-13pu_note.txt
2003-11-14Chapter 6.ppt
2003-11-15note.doc
2003-11-17Remarks on unknown key-share attack on authenticated.ppt
2003-11-17multisignature.ppt
2003-11-192_Digital signature schemes based on factoring and discrete logarithms.ppt
2003-11-19Digital signature schemes based on factoring and discrete logarithms.ppt
2003-11-19Digital signature schemes based on factoring and discrete logarithms_2.ppt
2003-11-19Digital signature schemes based on factoring and discrete logarithms_3.ppt
2003-11-2409MAKEP.ppt
2003-11-2409MAKEPlp .ppt
2003-11-242_Improved Yen-Joye
2003-11-242_Unknown Key-share attack on authenticated multiple-key agreement protocol .ppt
2003-11-249.ppt
2003-11-24Improved Yen-Joye
2003-11-24Unknown Key-share attack on authenticated multiple-key agreement protocol .ppt
2003-11-24Unknown Key-share attack on authenticated multiple-key agreement protocol(new).ppt
2003-11-24multiple key agreement protocol.ppt
2003-11-3attention.doc
2003-11-3group-list.xls
2003-11-3注意事項.doc
2003-11-3報告組別.xls
2003-11-4Chapter5.ppt
2003-12-12_A practical (t, n) threshold.ppt
2003-12-1A practical (t, n) threshold.ppt
2003-12-1c.ppt
2003-12-1score.xls
2003-12-10Security Enhancement for Optimal Strong-Password Authentication Protocol.ppt
2003-12-22A Flexible Remote User Authentication Scheme Using Smart Cards.ppt
2003-12-22b.ppt
2003-12-22cryptography 1222.ppt
2003-12-24Efficient.ppt
2003-12-29Efficient.ppt
2003-12-29security project14.ppt
2003-12-29密碼學project.ppt
2003-12-3Proxy Blind Singnature .ppt
2003-12-82_Publicly verifiable authenticated encryption.ppt
2003-12-8A practical (t, n) threshold.ppt
2003-12-8Publicly verifiable authenticated encryption.ppt
2003-2-1vimrc
2003-3-10Ch06.ppt
2003-3-11Ch07.ppt
2003-3-12Ch08.ppt
2003-3-13Ch09.ppt
2003-3-14Ch10.ppt
2003-3-15Ch11.ppt
2003-3-16Ch12.ppt
2003-3-17Ch13.ppt
2003-3-19Ch14.ppt
2003-3-5Ch01.ppt
2003-3-6Ch02.ppt
2003-3-7Ch03.ppt
2003-3-8Ch04.ppt
2003-3-9Ch05.ppt
2003-9-152_chapter2.ppt
2003-9-15chapter1.ppt
2003-9-15chapter2.ppt
2003-9-15chapter3.ppt
2003-9-222_chapter1.ppt
2003-9-22chapter1-1.ppt
2003-9-22chapter1.ppt
2003-9-242_chapter1-1.ppt
2003-9-24chapter1-1.ppt
2003-9-24chapter2.ppt
2003-9-24chapter3-1.ppt
2003-9-24chapter3-2.ppt
2003-9-29chapter1-1.ppt
2003-9-29chapter2.ppt
2003-9-29chapter3-2.ppt
2004-1-1final.doc
2004-1-9list.xls
2004-4-23bnc
2004-4-23d2
2004-4-23space