教學課程
高等密碼學 (2004)
上一頁
日期授課內容
2002-2-1693410012.ppt
2002-2-1A Distributed Sign-and-Encryption for Anonymity.ppt
2002-2-1Cryptanalysis of Tseng et al
2002-2-1Publicly verifiable authenticated encryption.ppt
2002-2-1presentation list.doc
2004-10-11ROSI.ppt
2004-10-1320041013_Cryptanalysis on Mu–Varadharajan
2004-10-1320041013_Cryptanalysis on Mu–Varadharajans e-voting schemes.ppt
2004-10-1320041013_Cryptanalysis.ppt
2004-10-132_20041013_Cryptanalysis on Mu–Varadharajans e-voting schemes.ppt
2004-10-132_20041013_Cryptanalysis.ppt
2004-10-13Publicly verifiable authenticated encryption.ppt
2004-10-18Publicly verifiable authenticated encryption.ppt
2004-10-18ROSI.ppt
2004-10-202_A user friendly remote authentication scheme with smart card.ppt
2004-10-202_A user friendly remote authentication scheme with smart cards.ppt
2004-10-20A user friendly remote authentication scheme with smart card.ppt
2004-10-20A user friendly remote authentication scheme with smart cards.ppt
2004-10-20Cryptanalysis of Shieh-Lin-Yang-Sun Signature Scheme.ppt
2004-10-20Some Attacks on Chikazawa-Yamagishi ID-Based Key Sharing Scheme.ppt
2004-10-25Randomization Enhanced Blind Signature Schemes Based on RSA.ppt
2004-10-27Comments on threshold proxy signature base on RSA.ppt
2004-10-27Some Attacks on Chikazawa-Yamagishi ID-Based Key Sharing Scheme.ppt
2004-10-610_6_report-Cryptanalysis of a user friendly remote authentication scheme.ppt
2004-10-62_Security enhancement for the timestamp-based password authentication.ppt
2004-10-6Analysis of the SPEKE password authentication key exchange protocol.ppt
2004-10-6Efficient password authenticated key agreement using smart cards.ppt
2004-10-6Security enhancement for the timestamp-based password authentication.ppt
2004-11-12_Attacks to Xu Tilborg Conference Key Distribution Scheme.ppt
2004-11-13_Attacks to Xu Tilborg Conference Key Distribution Scheme.ppt
2004-11-1Attacks to Xu Tilborg Conference Key Distribution Scheme.ppt
2004-11-1Attacks to Xu-Tilborg
2004-11-24A scalable and distributed multicast security protocol using subgroup-key hierarchy.ppt
2004-11-24multisecret sharing.ppt
2004-11-29Cryptanalyses and improvements of two cryptographic key assignment.ppt
2004-11-3..
2004-11-32_(New)A Note on a User Friendly Remote Authentication.ppt
2004-11-3A Note on a User Friendly Remote Authentication.ppt
2004-11-3Traceability on RSA_based partially signature with low computation.ppt
2004-11-82_A Distributed Sign-and-Encryption for Anonymity.ppt
2004-11-82_Cryptanalyses and improvements of two cryptographic key assignment.ppt
2004-11-82_Cryptanalysis of LHL-key authentication scheme.ppt
2004-11-82_Cryptanalysis of an enhanced timestamp-based password authentication scheme.ppt
2004-11-8A Distributed Sign-and-Encryption for Anonymity.ppt
2004-11-8A Distributed Sign-and-Encryption for Anonymity_updated.ppt
2004-11-8Cryptanalyses and improvements of two cryptographic key assignment.ppt
2004-11-8Cryptanalysis of LHL-key authentication scheme.ppt
2004-11-8Cryptanalysis of LHL-key authentication scheme2.ppt
2004-11-8Cryptanalysis of an enhanced timestamp-based password authentication scheme.ppt
2004-12-12_key distribution preserving anonymity new.ppt
2004-12-1key distribution preserving anonymity new.ppt
2004-12-13On the Forward Secrecy of Chikazawa-Yamagishi ID.ppt
2004-12-15Cryptanalysis of Tseng et al
2004-12-15Methods for Preventing Unauthorized Software Distribution.ppt
2004-12-22_2_Improved Authenticated Multiple-Key Agreement Protocol.ppt
2004-12-22_Improved Authenticated Multiple-Key Agreement Protocol.ppt
2004-12-2Improved Authenticated Multiple-Key Agreement Protocol.ppt
2004-12-2Improved Authenticated Multiple-Key Agreement Protocol1.ppt
2004-12-202_693410012.ppt
2004-12-20693410012.ppt
2004-12-222_Key Substitution Attacks on Some Provably Secure Signature Schemes.ppt
2004-12-22Comments on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications.ppt
2004-12-22Key Substitution Attacks on Some Provably Secure Signature Schemes.ppt
2004-12-272_Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-273_Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-274_Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-27Analysis on Traceability on Stadler Fair Blind Signature.ppt
2004-12-27Comments on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications(update).ppt
2004-12-292_Cryptanalysis of Scalable Multicast Security Protocol.ppt
2004-12-292_Traceability on Stadler et al
2004-12-29Cryptanalysis of Scalable Multicast Security Protocol.ppt
2004-12-29Traceability on Stadler et al
2004-12-620041206_Saul.ppt
2004-12-620041206_Scalable key exchange transformation from two-party to group.ppt
2004-12-62_20041206_Scalable key exchange transformation from two-party to group.ppt
2004-12-82_Anonymous Wireless Authentication on a Portable Cellular Mobile.ppt
2004-12-8Anonymous Wireless Authentication on a Portable Cellular Mobile.ppt
2004-9-23presentation list.doc
2004-9-27A new key authentication scheme based on discrete.ppt
2004-9-27Efficient Time-Bound Hierarchical Key Assignment Scheme.ppt
2004-9-2909_29_report-Cryptanalysis of a user friendly remote authentication scheme.ppt
2004-9-29Integrating Diffie-Hellman Key Exchange into the Digital Signature.ppt
2004-9-29Integratining Diffie-Hellman Key Exchange into the Digital Signature.ppt
2005-1-3A secure electronic voting protocol for general elections.ppt
2005-1-5efficient threshold siger-ambiguous.ppt