Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.
by Yuen Ching Wah. === Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. === Includes bibliographical references (leaves 61-[63]). === Abstract also in Chinese. === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Why use cryptography? --- p.1 === Chapter 1.2 --- Why is authentication...
Other Authors: | |
---|---|
Format: | Others |
Language: | English Chinese |
Published: |
1998
|
Subjects: | |
Online Access: | http://library.cuhk.edu.hk/record=b5889523 http://repository.lib.cuhk.edu.hk/en/item/cuhk-322387 |
id |
ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_322387 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_3223872019-02-19T03:58:03Z Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. Computers--Access control Cryptography Random number generators by Yuen Ching Wah. Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. Includes bibliographical references (leaves 61-[63]). Abstract also in Chinese. Chapter 1 --- Introduction --- p.1 Chapter 1.1 --- Why use cryptography? --- p.1 Chapter 1.2 --- Why is authentication important ? --- p.2 Chapter 1.3 --- What is the relationship between authentication and digital sig- nature? --- p.3 Chapter 1.4 --- Why is random number important? --- p.3 Chapter 2 --- Background --- p.5 Chapter 2.1 --- Cryptography --- p.5 Chapter 2.1.1 --- Symmetric key cryptography --- p.5 Chapter 2.1.2 --- Asymmetric key cryptography --- p.7 Chapter 2.1.3 --- Authentication --- p.8 Chapter 2.2 --- Elliptic curve cryptography --- p.9 Chapter 2.2.1 --- Mathematical background for Elliptic curve cryptography --- p.10 Chapter 2.3 --- Pseudorandom number generator --- p.12 Chapter 2.3.1 --- Linear Congruential Generator --- p.13 Chapter 2.3.2 --- Inversive Congruential Generator --- p.13 Chapter 2.3.3 --- PN-sequence generator --- p.14 Chapter 2.4 --- Digital Signature Scheme --- p.14 Chapter 2.5 --- Babai's lattice vector algorithm --- p.16 Chapter 2.5.1 --- First Algorithm: Rounding Off --- p.17 Chapter 2.5.2 --- Second Algorithm: Nearest Plane --- p.17 Chapter 3 --- Several Digital Signature Schemes --- p.18 Chapter 3.1 --- DSA --- p.19 Chapter 3.2 --- Nyberg-Rueppel Digital Signature --- p.21 Chapter 3.3 --- EC.DSA --- p.23 Chapter 3.4 --- EC-Nyberg-Rueppel Digital Signature Scheme --- p.26 Chapter 4 --- Miscellaneous Digital Signature Schemes and their PRNG --- p.29 Chapter 4.1 --- DSA with LCG --- p.30 Chapter 4.2 --- DSA with PN-sequence --- p.33 Chapter 4.2.1 --- Solution --- p.35 Chapter 4.3 --- DSA with ICG --- p.39 Chapter 4.3.1 --- Solution --- p.40 Chapter 4.4 --- EC_DSA with PN-sequence --- p.43 Chapter 4.4.1 --- Solution --- p.44 Chapter 4.5 --- EC一DSA with LCG --- p.45 Chapter 4.5.1 --- Solution --- p.46 Chapter 4.6 --- EC-DSA with ICG --- p.46 Chapter 4.6.1 --- Solution --- p.47 Chapter 4.7 --- Nyberg-Rueppel Digital Signature with PN-sequence --- p.48 Chapter 4.7.1 --- Solution --- p.49 Chapter 4.8 --- Nyberg-Rueppel Digital Signature with LCG --- p.50 Chapter 4.8.1 --- Solution --- p.50 Chapter 4.9 --- Nyberg-Rueppel Digital Signature with ICG --- p.51 Chapter 4.9.1 --- Solution --- p.52 Chapter 4.10 --- EC- Nyberg-Rueppel Digital Signature with LCG --- p.53 Chapter 4.10.1 --- Solution --- p.54 Chapter 4.11 --- EC- Nyberg-Rueppel Digital Signature with PN-sequence --- p.55 Chapter 4.11.1 --- Solution --- p.56 Chapter 4.12 --- EC-Nyberg-Rueppel Digital Signature with ICG --- p.56 Chapter 4.12.1 --- Solution --- p.57 Chapter 5 --- Conclusion --- p.59 Bibliography --- p.61 Yuen, Ching Wah. Chinese University of Hong Kong Graduate School. Division of Information Engineering. 1998 Text bibliography print vii, 61, [2] leaves : ill. ; 30 cm. cuhk:322387 http://library.cuhk.edu.hk/record=b5889523 eng chi Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) http://repository.lib.cuhk.edu.hk/en/islandora/object/cuhk%3A322387/datastream/TN/view/Study%20on%20elliptic%20curve%20public%20key%20cryptosystems%20with%20application%20of%20pseudorandom%20number%20generator.jpghttp://repository.lib.cuhk.edu.hk/en/item/cuhk-322387 |
collection |
NDLTD |
language |
English Chinese |
format |
Others
|
sources |
NDLTD |
topic |
Computers--Access control Cryptography Random number generators |
spellingShingle |
Computers--Access control Cryptography Random number generators Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. |
description |
by Yuen Ching Wah. === Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. === Includes bibliographical references (leaves 61-[63]). === Abstract also in Chinese. === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Why use cryptography? --- p.1 === Chapter 1.2 --- Why is authentication important ? --- p.2 === Chapter 1.3 --- What is the relationship between authentication and digital sig- nature? --- p.3 === Chapter 1.4 --- Why is random number important? --- p.3 === Chapter 2 --- Background --- p.5 === Chapter 2.1 --- Cryptography --- p.5 === Chapter 2.1.1 --- Symmetric key cryptography --- p.5 === Chapter 2.1.2 --- Asymmetric key cryptography --- p.7 === Chapter 2.1.3 --- Authentication --- p.8 === Chapter 2.2 --- Elliptic curve cryptography --- p.9 === Chapter 2.2.1 --- Mathematical background for Elliptic curve cryptography --- p.10 === Chapter 2.3 --- Pseudorandom number generator --- p.12 === Chapter 2.3.1 --- Linear Congruential Generator --- p.13 === Chapter 2.3.2 --- Inversive Congruential Generator --- p.13 === Chapter 2.3.3 --- PN-sequence generator --- p.14 === Chapter 2.4 --- Digital Signature Scheme --- p.14 === Chapter 2.5 --- Babai's lattice vector algorithm --- p.16 === Chapter 2.5.1 --- First Algorithm: Rounding Off --- p.17 === Chapter 2.5.2 --- Second Algorithm: Nearest Plane --- p.17 === Chapter 3 --- Several Digital Signature Schemes --- p.18 === Chapter 3.1 --- DSA --- p.19 === Chapter 3.2 --- Nyberg-Rueppel Digital Signature --- p.21 === Chapter 3.3 --- EC.DSA --- p.23 === Chapter 3.4 --- EC-Nyberg-Rueppel Digital Signature Scheme --- p.26 === Chapter 4 --- Miscellaneous Digital Signature Schemes and their PRNG --- p.29 === Chapter 4.1 --- DSA with LCG --- p.30 === Chapter 4.2 --- DSA with PN-sequence --- p.33 === Chapter 4.2.1 --- Solution --- p.35 === Chapter 4.3 --- DSA with ICG --- p.39 === Chapter 4.3.1 --- Solution --- p.40 === Chapter 4.4 --- EC_DSA with PN-sequence --- p.43 === Chapter 4.4.1 --- Solution --- p.44 === Chapter 4.5 --- EC一DSA with LCG --- p.45 === Chapter 4.5.1 --- Solution --- p.46 === Chapter 4.6 --- EC-DSA with ICG --- p.46 === Chapter 4.6.1 --- Solution --- p.47 === Chapter 4.7 --- Nyberg-Rueppel Digital Signature with PN-sequence --- p.48 === Chapter 4.7.1 --- Solution --- p.49 === Chapter 4.8 --- Nyberg-Rueppel Digital Signature with LCG --- p.50 === Chapter 4.8.1 --- Solution --- p.50 === Chapter 4.9 --- Nyberg-Rueppel Digital Signature with ICG --- p.51 === Chapter 4.9.1 --- Solution --- p.52 === Chapter 4.10 --- EC- Nyberg-Rueppel Digital Signature with LCG --- p.53 === Chapter 4.10.1 --- Solution --- p.54 === Chapter 4.11 --- EC- Nyberg-Rueppel Digital Signature with PN-sequence --- p.55 === Chapter 4.11.1 --- Solution --- p.56 === Chapter 4.12 --- EC-Nyberg-Rueppel Digital Signature with ICG --- p.56 === Chapter 4.12.1 --- Solution --- p.57 === Chapter 5 --- Conclusion --- p.59 === Bibliography --- p.61 |
author2 |
Yuen, Ching Wah. |
author_facet |
Yuen, Ching Wah. |
title |
Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. |
title_short |
Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. |
title_full |
Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. |
title_fullStr |
Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. |
title_full_unstemmed |
Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. |
title_sort |
study on elliptic curve public key cryptosystems with application of pseudorandom number generator. |
publishDate |
1998 |
url |
http://library.cuhk.edu.hk/record=b5889523 http://repository.lib.cuhk.edu.hk/en/item/cuhk-322387 |
_version_ |
1718980469024882688 |