首页 > 最新文献

Cryptography最新文献

英文 中文
Authentication of Smart Grid 智能电网认证
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-1763-5.ch015
Melesio Calderon Munoz, M. Moh
The electrical power grid forms the functional foundation of our modern societies, but in the near future our aging electrical infrastructure will not be able to keep pace with our demands. As a result, nations worldwide have started to convert their power grids into smart grids that will have improved communication and control systems. A smart grid will be better able to incorporate new forms of energy generation as well as be self-healing and more reliable. This paper investigates a threat to wireless communication networks from a fully realized quantum computer, and provides a means to avoid this problem in smart grid domains. We discuss and compare the security aspects, the complexities and the performance of authentication using public-key cryptography and using Merkel trees. As a result, we argue for the use of Merkle trees as opposed to public key encryption for authentication of devices in wireless mesh networks (WMN) used in smart grid applications.
电网构成了现代社会的功能基础,但在不久的将来,我们老化的电力基础设施将无法满足我们的需求。因此,世界各国已开始将其电网转变为智能电网,这将改善通信和控制系统。智能电网将能够更好地整合新形式的能源发电,并具有自我修复能力,更加可靠。本文研究了完全实现的量子计算机对无线通信网络的威胁,并提供了在智能电网领域避免这一问题的方法。我们讨论并比较了使用公钥加密和使用默克尔树进行身份验证的安全性、复杂性和性能。因此,我们主张使用默克尔树而不是公钥加密来对智能电网应用中使用的无线网状网络(WMN)中的设备进行身份验证。
{"title":"Authentication of Smart Grid","authors":"Melesio Calderon Munoz, M. Moh","doi":"10.4018/978-1-7998-1763-5.ch015","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch015","url":null,"abstract":"The electrical power grid forms the functional foundation of our modern societies, but in the near future our aging electrical infrastructure will not be able to keep pace with our demands. As a result, nations worldwide have started to convert their power grids into smart grids that will have improved communication and control systems. A smart grid will be better able to incorporate new forms of energy generation as well as be self-healing and more reliable. This paper investigates a threat to wireless communication networks from a fully realized quantum computer, and provides a means to avoid this problem in smart grid domains. We discuss and compare the security aspects, the complexities and the performance of authentication using public-key cryptography and using Merkel trees. As a result, we argue for the use of Merkle trees as opposed to public key encryption for authentication of devices in wireless mesh networks (WMN) used in smart grid applications.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70443163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Algorithms for Next Generation Wireless Networks Security 下一代无线网络安全的加密算法
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/978-1-4666-8687-8.CH009
Vishnu Suryavanshi, G. C. Manna
At present a majority of computer and telecommunication systems requires data security when data is transmitted the over next generation network. Data that is transient over an unsecured Next Generation wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user's information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography algorithm provides a solution towards absolute communication security over the next generation network by encoding information as polarized photons, which can be sent through the air security issues and services using cryptographic algorithm explained in this chapter.
目前,大多数计算机和电信系统在下一代网络上传输数据时都要求数据安全。在不安全的下一代无线网络上传输的瞬时数据总是容易被无线信号范围内的任何人拦截。因此,在无线连接时提供安全通信以保证用户信息和设备的安全已成为主要关注的问题之一。量子加密算法通过将信息编码为偏振光子,提供了下一代网络绝对通信安全的解决方案,这些信息可以使用本章解释的加密算法通过空中安全问题和服务发送。
{"title":"Cryptographic Algorithms for Next Generation Wireless Networks Security","authors":"Vishnu Suryavanshi, G. C. Manna","doi":"10.4018/978-1-4666-8687-8.CH009","DOIUrl":"https://doi.org/10.4018/978-1-4666-8687-8.CH009","url":null,"abstract":"At present a majority of computer and telecommunication systems requires data security when data is transmitted the over next generation network. Data that is transient over an unsecured Next Generation wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user's information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography algorithm provides a solution towards absolute communication security over the next generation network by encoding information as polarized photons, which can be sent through the air security issues and services using cryptographic algorithm explained in this chapter.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70429208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Parameterized Shared Key for AVK Approach AVK方法的参数化共享密钥研究
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0536-5.CH004
S. Prajapat, R. S. Thakur
“Key” plays a vital role in every symmetric key cryptosystem. The obvious way of enhancing security of any cryptosystem is to keep the key as large as possible. But it may not be suitable for low power devices since higher computation will be done for longer keys and that will increase the power requirement which decreases the device's performance. In order to resolve the former specified problem an alternative approach can be used in which the length of key is fixed and its value varies in every session. This is Time Variant Key approach or Automatic Variable Key (AVK) approach. The Security of AVK based cryptosystem is enhanced by exchanging some parameters instead of keys between the communicating parties, then these parameters will be used to generate required keys at the receiver end. This chapter presents implementation of the above specified Mechanism. A model has been demonstrated with parameterized scheme and issues in AVK approach. Further, it has been analyzed from different users' perspectives. This chapter also highlights the benefits of AVK model to ensure two levels of security with characterization of methods for AVK and Estimation of key computation based on parameters only. The characteristic components of recent styles of key design with consideration of key size, life time of key and breaking threshold has also been pointed out. These characteristics are essential in the design of efficient symmetric key cryptosystem. The novel approach of AVK based cryptosystem is suitable for low power devices and useful for exchanging very large objects or files. This scheme has been demonstrated with Fibonacci-Q matrix and sparse matrix based diffused key information exchange procedures. These models have been further tested from perspective of hackers and cryptanalyst, to exploit any weakness with fixed size dynamic keys.
“密钥”在每一个对称密钥密码系统中都起着至关重要的作用。增强任何密码系统安全性的明显方法是保持密钥尽可能大。但它可能不适合低功耗设备,因为更长的密钥将完成更高的计算,这将增加功率需求,从而降低设备的性能。为了解决前一个指定的问题,可以使用另一种方法,其中密钥的长度是固定的,并且它的值在每个会话中都是变化的。这是时变键方法或自动可变键(AVK)方法。基于AVK的密码系统通过在通信双方之间交换一些参数来代替密钥,然后使用这些参数在接收端生成所需的密钥,从而提高了系统的安全性。本章介绍上述指定机制的实现。用参数化方案对模型进行了论证,并指出了AVK方法中存在的问题。进一步,从不同的用户角度进行了分析。本章还强调了AVK模型的好处,通过描述AVK方法和仅基于参数的密钥计算估计来确保两个级别的安全性。指出了考虑按键尺寸、按键寿命和断键阈值等因素的按键设计的特点。这些特性对于设计高效的对称密钥密码系统至关重要。这种新颖的基于AVK的加密方法适用于低功耗设备,适用于交换非常大的对象或文件。该方案通过基于Fibonacci-Q矩阵和稀疏矩阵的扩散密钥信息交换程序进行了验证。这些模型已经从黑客和密码分析师的角度进行了进一步的测试,以利用固定大小动态密钥的任何弱点。
{"title":"Towards Parameterized Shared Key for AVK Approach","authors":"S. Prajapat, R. S. Thakur","doi":"10.4018/978-1-5225-0536-5.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-0536-5.CH004","url":null,"abstract":"“Key” plays a vital role in every symmetric key cryptosystem. The obvious way of enhancing security of any cryptosystem is to keep the key as large as possible. But it may not be suitable for low power devices since higher computation will be done for longer keys and that will increase the power requirement which decreases the device's performance. In order to resolve the former specified problem an alternative approach can be used in which the length of key is fixed and its value varies in every session. This is Time Variant Key approach or Automatic Variable Key (AVK) approach. The Security of AVK based cryptosystem is enhanced by exchanging some parameters instead of keys between the communicating parties, then these parameters will be used to generate required keys at the receiver end. This chapter presents implementation of the above specified Mechanism. A model has been demonstrated with parameterized scheme and issues in AVK approach. Further, it has been analyzed from different users' perspectives. This chapter also highlights the benefits of AVK model to ensure two levels of security with characterization of methods for AVK and Estimation of key computation based on parameters only. The characteristic components of recent styles of key design with consideration of key size, life time of key and breaking threshold has also been pointed out. These characteristics are essential in the design of efficient symmetric key cryptosystem. The novel approach of AVK based cryptosystem is suitable for low power devices and useful for exchanging very large objects or files. This scheme has been demonstrated with Fibonacci-Q matrix and sparse matrix based diffused key information exchange procedures. These models have been further tested from perspective of hackers and cryptanalyst, to exploit any weakness with fixed size dynamic keys.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70430950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Chaotic Function Based ECG Encryption System 基于混沌函数的心电加密系统
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0920-2.CH013
B. P. Singh, Manjit Singh, Dixit Sharma
Remote health-care monitoring systems communicate biomedical information (e.g. Electrocardiogram (ECG)) over insecure networks. Protection of the integrity, authentication and confidentiality of the medical data is a challenging issue. This chapter proposed an encryption process having a 4-round five steps -encryption structure includes: the random pixel insertion, row separation, substitution of each separated row, row combination and rotation. Accuracy and security analysis of proposed method for 2D ECG encryption is evaluated on MIT-BIH arrhythmia database.
远程保健监测系统通过不安全的网络传送生物医学信息(如心电图)。保护医疗数据的完整性、身份验证和机密性是一个具有挑战性的问题。本章提出了一个4轮5步的加密过程,加密结构包括:随机像素插入、行分离、每隔一行的替换、行组合和旋转。在MIT-BIH心律失常数据库上对所提出的二维心电加密方法进行了准确性和安全性分析。
{"title":"Chaotic Function Based ECG Encryption System","authors":"B. P. Singh, Manjit Singh, Dixit Sharma","doi":"10.4018/978-1-5225-0920-2.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-0920-2.CH013","url":null,"abstract":"Remote health-care monitoring systems communicate biomedical information (e.g. Electrocardiogram (ECG)) over insecure networks. Protection of the integrity, authentication and confidentiality of the medical data is a challenging issue. This chapter proposed an encryption process having a 4-round five steps -encryption structure includes: the random pixel insertion, row separation, substitution of each separated row, row combination and rotation. Accuracy and security analysis of proposed method for 2D ECG encryption is evaluated on MIT-BIH arrhythmia database.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70431386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Video Saliency Detection for Visual Cryptography-Based Watermarking 基于视觉密码的视频显著性水印检测
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/978-1-4666-8723-3.CH006
Adrita Barari, S. Dhavale
The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also highlighted in the context of Visual Cryptography based watermarking systems for videos. All schemes in literature related to Visual cryptography based video watermarking, have been brought together with special attention on the role of saliency feature extraction in each of these schemes. Further a novel approach for VC based video watermarking using motion vectors (MVP Algorithm) as a salient feature is suggested. Experimental results show the robustness of proposed MVP Algorithm against various video processing attacks. Also, compression scale invariance is achieved.
本章的目的是回顾视觉密码技术在非侵入式视频水印中的应用。在基于视觉密码学的视频水印系统中,也强调了显著性特征提取的力量。文献中与基于视觉密码的视频水印相关的所有方案都被汇集在一起,并特别关注每个方案中显著性特征提取的作用。进一步提出了一种以运动矢量(MVP算法)为显著特征的基于VC的视频水印方法。实验结果表明了该算法对各种视频处理攻击的鲁棒性。同时,实现了压缩尺度的不变性。
{"title":"Video Saliency Detection for Visual Cryptography-Based Watermarking","authors":"Adrita Barari, S. Dhavale","doi":"10.4018/978-1-4666-8723-3.CH006","DOIUrl":"https://doi.org/10.4018/978-1-4666-8723-3.CH006","url":null,"abstract":"The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also highlighted in the context of Visual Cryptography based watermarking systems for videos. All schemes in literature related to Visual cryptography based video watermarking, have been brought together with special attention on the role of saliency feature extraction in each of these schemes. Further a novel approach for VC based video watermarking using motion vectors (MVP Algorithm) as a salient feature is suggested. Experimental results show the robustness of proposed MVP Algorithm against various video processing attacks. Also, compression scale invariance is achieved.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70429273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Contemplator on Topical Image Encryption Measures 局部图像加密措施的思考
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-2296-6.CH009
J. Mondal, Debabala Swain
Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.
在这个多媒体时代,图像极大地辅助了数字通信。当一个人在一个脆弱的通信网络上传输机密图像时,纯粹的保护是一种保护图像隐私的争论。加密是一种抓住图像隐性的方法。图像加密为互联网上安全的视觉数据通信提供了卓越的安全保障。我们的工作阐述了对不同领域的图像加密的调查,为密码学提供了简明的简介,此外,还对各种图像加密技术进行了回顾。
{"title":"A Contemplator on Topical Image Encryption Measures","authors":"J. Mondal, Debabala Swain","doi":"10.4018/978-1-5225-2296-6.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-2296-6.CH009","url":null,"abstract":"Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70432339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Provable Security for Public Key Cryptosystems 公钥密码系统的可证明安全性
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-1763-5.ch013
Syed Taqi Ali
In the early years after the invention of public key cryptography by Diffie and Hellman in 1976, the design and evaluation of public key cryptosystems has been done merely in ad-hoc manner based on trial and error. The public key cryptosystem said to be secure as long as there is no successful cryptanalytic attack on it. But due to various successful attacks on the cryptosystems after development, the cryptographic community understood that this ad-hoc approach might not be good enough. The paradigm of provable security is an attempt to get rid of ad hoc design. The goals of provable security are to define appropriate models of security on the one hand, and to develop cryptographic designs that can be proven to be secure within the defined models on the other. There are two general approaches for structuring the security proof. One is reductionist approach and other is game-based approach. In these approaches, the security proofs reduce a well known problem (such as discrete logarithm, RSA) to an attack against a proposed cryptosystem. With this approach, the security of public key cryptosystem can be proved formally under the various models viz. random oracle model, generic group model and standard model. In this chapter, we will briefly explain these approaches along with the security proofs of well known public key cryptosystems under the appropriate model.
在Diffie和Hellman于1976年发明公钥密码学之后的早期,公钥密码系统的设计和评估仅仅是以基于试错的临时方式完成的。只要没有成功的密码分析攻击,公钥密码系统就被认为是安全的。但是由于开发后对密码系统的各种成功攻击,加密社区明白这种临时方法可能不够好。可证明安全性范式是一种摆脱临时设计的尝试。可证明安全性的目标一方面是定义适当的安全性模型,另一方面是开发可以在定义的模型中被证明是安全的加密设计。有两种构建安全性证明的一般方法。一种是简化方法,另一种是基于游戏的方法。在这些方法中,安全性证明将一个众所周知的问题(如离散对数、RSA)简化为对提议的密码系统的攻击。利用该方法,可以在随机oracle模型、通用群模型和标准模型下形式化地证明公钥密码系统的安全性。在本章中,我们将简要解释这些方法以及在适当模型下已知公钥密码系统的安全性证明。
{"title":"Provable Security for Public Key Cryptosystems","authors":"Syed Taqi Ali","doi":"10.4018/978-1-7998-1763-5.ch013","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch013","url":null,"abstract":"In the early years after the invention of public key cryptography by Diffie and Hellman in 1976, the design and evaluation of public key cryptosystems has been done merely in ad-hoc manner based on trial and error. The public key cryptosystem said to be secure as long as there is no successful cryptanalytic attack on it. But due to various successful attacks on the cryptosystems after development, the cryptographic community understood that this ad-hoc approach might not be good enough. The paradigm of provable security is an attempt to get rid of ad hoc design. The goals of provable security are to define appropriate models of security on the one hand, and to develop cryptographic designs that can be proven to be secure within the defined models on the other. There are two general approaches for structuring the security proof. One is reductionist approach and other is game-based approach. In these approaches, the security proofs reduce a well known problem (such as discrete logarithm, RSA) to an attack against a proposed cryptosystem. With this approach, the security of public key cryptosystem can be proved formally under the various models viz. random oracle model, generic group model and standard model. In this chapter, we will briefly explain these approaches along with the security proofs of well known public key cryptosystems under the appropriate model.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70443023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shannon’s Theory, Perfect Secrecy, and the One-Time Pad 香农理论,完全保密,一次性笔记本
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-3
Douglas R Stinson, Maura B. Paterson
{"title":"Shannon’s Theory, Perfect Secrecy, and the One-Time Pad","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-3","DOIUrl":"https://doi.org/10.1201/9781315282497-3","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41600937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signature Schemes 签名方案
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-8
Douglas R Stinson, Maura B. Paterson
{"title":"Signature Schemes","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-8","DOIUrl":"https://doi.org/10.1201/9781315282497-8","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43326320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Post-Quantum Cryptography Post-Quantum密码学
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-08-14 DOI: 10.1007/978-3-319-79063-3
Douglas R Stinson, Maura B. Paterson
{"title":"Post-Quantum Cryptography","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1007/978-3-319-79063-3","DOIUrl":"https://doi.org/10.1007/978-3-319-79063-3","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/978-3-319-79063-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43765201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1