cryptographic相关论文
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure i......
With the development of data intensive application, such as multimedia, data warehouse, and online analysis processing, ......
Coupled map lattices (CML) have been recently used to construct ciphers. However, the complicated operations on real num......
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party com......
Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pai......

