教學課程
高等密碼學 (2004)
上一頁
日期
授課內容
2002-2-1
693410012.ppt
2002-2-1
A Distributed Sign-and-Encryption for Anonymity.ppt
2002-2-1
Cryptanalysis of Tseng et al
2002-2-1
Publicly verifiable authenticated encryption.ppt
2002-2-1
presentation list.doc
2004-10-11
ROSI.ppt
2004-10-13
20041013_Cryptanalysis on Mu–Varadharajan
2004-10-13
20041013_Cryptanalysis on Mu–Varadharajans e-voting schemes.ppt
2004-10-13
20041013_Cryptanalysis.ppt
2004-10-13
2_20041013_Cryptanalysis on Mu–Varadharajans e-voting schemes.ppt
2004-10-13
2_20041013_Cryptanalysis.ppt
2004-10-13
Publicly verifiable authenticated encryption.ppt
2004-10-18
Publicly verifiable authenticated encryption.ppt
2004-10-18
ROSI.ppt
2004-10-20
2_A user friendly remote authentication scheme with smart card.ppt
2004-10-20
2_A user friendly remote authentication scheme with smart cards.ppt
2004-10-20
A user friendly remote authentication scheme with smart card.ppt
2004-10-20
A user friendly remote authentication scheme with smart cards.ppt
2004-10-20
Cryptanalysis of Shieh-Lin-Yang-Sun Signature Scheme.ppt
2004-10-20
Some Attacks on Chikazawa-Yamagishi ID-Based Key Sharing Scheme.ppt
2004-10-25
Randomization Enhanced Blind Signature Schemes Based on RSA.ppt
2004-10-27
Comments on threshold proxy signature base on RSA.ppt
2004-10-27
Some Attacks on Chikazawa-Yamagishi ID-Based Key Sharing Scheme.ppt
2004-10-6
10_6_report-Cryptanalysis of a user friendly remote authentication scheme.ppt
2004-10-6
2_Security enhancement for the timestamp-based password authentication.ppt
2004-10-6
Analysis of the SPEKE password authentication key exchange protocol.ppt
2004-10-6
Efficient password authenticated key agreement using smart cards.ppt
2004-10-6
Security enhancement for the timestamp-based password authentication.ppt
2004-11-1
2_Attacks to Xu Tilborg Conference Key Distribution Scheme.ppt
2004-11-1
3_Attacks to Xu Tilborg Conference Key Distribution Scheme.ppt
2004-11-1
Attacks to Xu Tilborg Conference Key Distribution Scheme.ppt
2004-11-1
Attacks to Xu-Tilborg
2004-11-24
A scalable and distributed multicast security protocol using subgroup-key hierarchy.ppt
2004-11-24
multisecret sharing.ppt
2004-11-29
Cryptanalyses and improvements of two cryptographic key assignment.ppt
2004-11-3
..
2004-11-3
2_(New)A Note on a User Friendly Remote Authentication.ppt
2004-11-3
A Note on a User Friendly Remote Authentication.ppt
2004-11-3
Traceability on RSA_based partially signature with low computation.ppt
2004-11-8
2_A Distributed Sign-and-Encryption for Anonymity.ppt
2004-11-8
2_Cryptanalyses and improvements of two cryptographic key assignment.ppt
2004-11-8
2_Cryptanalysis of LHL-key authentication scheme.ppt
2004-11-8
2_Cryptanalysis of an enhanced timestamp-based password authentication scheme.ppt
2004-11-8
A Distributed Sign-and-Encryption for Anonymity.ppt
2004-11-8
A Distributed Sign-and-Encryption for Anonymity_updated.ppt
2004-11-8
Cryptanalyses and improvements of two cryptographic key assignment.ppt
2004-11-8
Cryptanalysis of LHL-key authentication scheme.ppt
2004-11-8
Cryptanalysis of LHL-key authentication scheme2.ppt
2004-11-8
Cryptanalysis of an enhanced timestamp-based password authentication scheme.ppt
2004-12-1
2_key distribution preserving anonymity new.ppt
2004-12-1
key distribution preserving anonymity new.ppt
2004-12-13
On the Forward Secrecy of Chikazawa-Yamagishi ID.ppt
2004-12-15
Cryptanalysis of Tseng et al
2004-12-15
Methods for Preventing Unauthorized Software Distribution.ppt
2004-12-2
2_2_Improved Authenticated Multiple-Key Agreement Protocol.ppt
2004-12-2
2_Improved Authenticated Multiple-Key Agreement Protocol.ppt
2004-12-2
Improved Authenticated Multiple-Key Agreement Protocol.ppt
2004-12-2
Improved Authenticated Multiple-Key Agreement Protocol1.ppt
2004-12-20
2_693410012.ppt
2004-12-20
693410012.ppt
2004-12-22
2_Key Substitution Attacks on Some Provably Secure Signature Schemes.ppt
2004-12-22
Comments on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications.ppt
2004-12-22
Key Substitution Attacks on Some Provably Secure Signature Schemes.ppt
2004-12-27
2_Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-27
3_Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-27
4_Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-27
Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-27
Comments on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications(update).ppt
2004-12-29
2_Cryptanalysis of Scalable Multicast Security Protocol.ppt
2004-12-29
2_Traceability on Stadler et al
2004-12-29
Cryptanalysis of Scalable Multicast Security Protocol.ppt
2004-12-29
Traceability on Stadler et al
2004-12-6
20041206_Saul.ppt
2004-12-6
20041206_Scalable key exchange transformation from two-party to group.ppt
2004-12-6
2_20041206_Scalable key exchange transformation from two-party to group.ppt
2004-12-8
2_Anonymous Wireless Authentication on a Portable Cellular Mobile.ppt
2004-12-8
Anonymous Wireless Authentication on a Portable Cellular Mobile.ppt
2004-9-23
presentation list.doc
2004-9-27
A new key authentication scheme based on discrete.ppt
2004-9-27
Efficient Time-Bound Hierarchical Key Assignment Scheme.ppt
2004-9-29
09_29_report-Cryptanalysis of a user friendly remote authentication scheme.ppt
2004-9-29
Integrating Diffie-Hellman Key Exchange into the Digital Signature.ppt
2004-9-29
Integratining Diffie-Hellman Key Exchange into the Digital Signature.ppt
2005-1-3
A secure electronic voting protocol for general elections.ppt
2005-1-5
efficient threshold siger-ambiguous.ppt