Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.

by Yuen Ching Wah. === Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. === Includes bibliographical references (leaves 61-[63]). === Abstract also in Chinese. === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Why use cryptography? --- p.1 === Chapter 1.2 --- Why is authentication...

Full description

Bibliographic Details
Other Authors: Yuen, Ching Wah.
Format: Others
Language:English
Chinese
Published: 1998
Subjects:
Online Access:http://library.cuhk.edu.hk/record=b5889523
http://repository.lib.cuhk.edu.hk/en/item/cuhk-322387
id ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_322387
record_format oai_dc
spelling ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_3223872019-02-19T03:58:03Z Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. Computers--Access control Cryptography Random number generators by Yuen Ching Wah. Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. Includes bibliographical references (leaves 61-[63]). Abstract also in Chinese. Chapter 1 --- Introduction --- p.1 Chapter 1.1 --- Why use cryptography? --- p.1 Chapter 1.2 --- Why is authentication important ? --- p.2 Chapter 1.3 --- What is the relationship between authentication and digital sig- nature? --- p.3 Chapter 1.4 --- Why is random number important? --- p.3 Chapter 2 --- Background --- p.5 Chapter 2.1 --- Cryptography --- p.5 Chapter 2.1.1 --- Symmetric key cryptography --- p.5 Chapter 2.1.2 --- Asymmetric key cryptography --- p.7 Chapter 2.1.3 --- Authentication --- p.8 Chapter 2.2 --- Elliptic curve cryptography --- p.9 Chapter 2.2.1 --- Mathematical background for Elliptic curve cryptography --- p.10 Chapter 2.3 --- Pseudorandom number generator --- p.12 Chapter 2.3.1 --- Linear Congruential Generator --- p.13 Chapter 2.3.2 --- Inversive Congruential Generator --- p.13 Chapter 2.3.3 --- PN-sequence generator --- p.14 Chapter 2.4 --- Digital Signature Scheme --- p.14 Chapter 2.5 --- Babai's lattice vector algorithm --- p.16 Chapter 2.5.1 --- First Algorithm: Rounding Off --- p.17 Chapter 2.5.2 --- Second Algorithm: Nearest Plane --- p.17 Chapter 3 --- Several Digital Signature Schemes --- p.18 Chapter 3.1 --- DSA --- p.19 Chapter 3.2 --- Nyberg-Rueppel Digital Signature --- p.21 Chapter 3.3 --- EC.DSA --- p.23 Chapter 3.4 --- EC-Nyberg-Rueppel Digital Signature Scheme --- p.26 Chapter 4 --- Miscellaneous Digital Signature Schemes and their PRNG --- p.29 Chapter 4.1 --- DSA with LCG --- p.30 Chapter 4.2 --- DSA with PN-sequence --- p.33 Chapter 4.2.1 --- Solution --- p.35 Chapter 4.3 --- DSA with ICG --- p.39 Chapter 4.3.1 --- Solution --- p.40 Chapter 4.4 --- EC_DSA with PN-sequence --- p.43 Chapter 4.4.1 --- Solution --- p.44 Chapter 4.5 --- EC一DSA with LCG --- p.45 Chapter 4.5.1 --- Solution --- p.46 Chapter 4.6 --- EC-DSA with ICG --- p.46 Chapter 4.6.1 --- Solution --- p.47 Chapter 4.7 --- Nyberg-Rueppel Digital Signature with PN-sequence --- p.48 Chapter 4.7.1 --- Solution --- p.49 Chapter 4.8 --- Nyberg-Rueppel Digital Signature with LCG --- p.50 Chapter 4.8.1 --- Solution --- p.50 Chapter 4.9 --- Nyberg-Rueppel Digital Signature with ICG --- p.51 Chapter 4.9.1 --- Solution --- p.52 Chapter 4.10 --- EC- Nyberg-Rueppel Digital Signature with LCG --- p.53 Chapter 4.10.1 --- Solution --- p.54 Chapter 4.11 --- EC- Nyberg-Rueppel Digital Signature with PN-sequence --- p.55 Chapter 4.11.1 --- Solution --- p.56 Chapter 4.12 --- EC-Nyberg-Rueppel Digital Signature with ICG --- p.56 Chapter 4.12.1 --- Solution --- p.57 Chapter 5 --- Conclusion --- p.59 Bibliography --- p.61 Yuen, Ching Wah. Chinese University of Hong Kong Graduate School. Division of Information Engineering. 1998 Text bibliography print vii, 61, [2] leaves : ill. ; 30 cm. cuhk:322387 http://library.cuhk.edu.hk/record=b5889523 eng chi Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) http://repository.lib.cuhk.edu.hk/en/islandora/object/cuhk%3A322387/datastream/TN/view/Study%20on%20elliptic%20curve%20public%20key%20cryptosystems%20with%20application%20of%20pseudorandom%20number%20generator.jpghttp://repository.lib.cuhk.edu.hk/en/item/cuhk-322387
collection NDLTD
language English
Chinese
format Others
sources NDLTD
topic Computers--Access control
Cryptography
Random number generators
spellingShingle Computers--Access control
Cryptography
Random number generators
Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
description by Yuen Ching Wah. === Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. === Includes bibliographical references (leaves 61-[63]). === Abstract also in Chinese. === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Why use cryptography? --- p.1 === Chapter 1.2 --- Why is authentication important ? --- p.2 === Chapter 1.3 --- What is the relationship between authentication and digital sig- nature? --- p.3 === Chapter 1.4 --- Why is random number important? --- p.3 === Chapter 2 --- Background --- p.5 === Chapter 2.1 --- Cryptography --- p.5 === Chapter 2.1.1 --- Symmetric key cryptography --- p.5 === Chapter 2.1.2 --- Asymmetric key cryptography --- p.7 === Chapter 2.1.3 --- Authentication --- p.8 === Chapter 2.2 --- Elliptic curve cryptography --- p.9 === Chapter 2.2.1 --- Mathematical background for Elliptic curve cryptography --- p.10 === Chapter 2.3 --- Pseudorandom number generator --- p.12 === Chapter 2.3.1 --- Linear Congruential Generator --- p.13 === Chapter 2.3.2 --- Inversive Congruential Generator --- p.13 === Chapter 2.3.3 --- PN-sequence generator --- p.14 === Chapter 2.4 --- Digital Signature Scheme --- p.14 === Chapter 2.5 --- Babai's lattice vector algorithm --- p.16 === Chapter 2.5.1 --- First Algorithm: Rounding Off --- p.17 === Chapter 2.5.2 --- Second Algorithm: Nearest Plane --- p.17 === Chapter 3 --- Several Digital Signature Schemes --- p.18 === Chapter 3.1 --- DSA --- p.19 === Chapter 3.2 --- Nyberg-Rueppel Digital Signature --- p.21 === Chapter 3.3 --- EC.DSA --- p.23 === Chapter 3.4 --- EC-Nyberg-Rueppel Digital Signature Scheme --- p.26 === Chapter 4 --- Miscellaneous Digital Signature Schemes and their PRNG --- p.29 === Chapter 4.1 --- DSA with LCG --- p.30 === Chapter 4.2 --- DSA with PN-sequence --- p.33 === Chapter 4.2.1 --- Solution --- p.35 === Chapter 4.3 --- DSA with ICG --- p.39 === Chapter 4.3.1 --- Solution --- p.40 === Chapter 4.4 --- EC_DSA with PN-sequence --- p.43 === Chapter 4.4.1 --- Solution --- p.44 === Chapter 4.5 --- EC一DSA with LCG --- p.45 === Chapter 4.5.1 --- Solution --- p.46 === Chapter 4.6 --- EC-DSA with ICG --- p.46 === Chapter 4.6.1 --- Solution --- p.47 === Chapter 4.7 --- Nyberg-Rueppel Digital Signature with PN-sequence --- p.48 === Chapter 4.7.1 --- Solution --- p.49 === Chapter 4.8 --- Nyberg-Rueppel Digital Signature with LCG --- p.50 === Chapter 4.8.1 --- Solution --- p.50 === Chapter 4.9 --- Nyberg-Rueppel Digital Signature with ICG --- p.51 === Chapter 4.9.1 --- Solution --- p.52 === Chapter 4.10 --- EC- Nyberg-Rueppel Digital Signature with LCG --- p.53 === Chapter 4.10.1 --- Solution --- p.54 === Chapter 4.11 --- EC- Nyberg-Rueppel Digital Signature with PN-sequence --- p.55 === Chapter 4.11.1 --- Solution --- p.56 === Chapter 4.12 --- EC-Nyberg-Rueppel Digital Signature with ICG --- p.56 === Chapter 4.12.1 --- Solution --- p.57 === Chapter 5 --- Conclusion --- p.59 === Bibliography --- p.61
author2 Yuen, Ching Wah.
author_facet Yuen, Ching Wah.
title Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
title_short Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
title_full Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
title_fullStr Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
title_full_unstemmed Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
title_sort study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
publishDate 1998
url http://library.cuhk.edu.hk/record=b5889523
http://repository.lib.cuhk.edu.hk/en/item/cuhk-322387
_version_ 1718980469024882688