Progress on Cryptography

25 Years of Cryptography in China

  • Kefei Chen

Part of the The International Series in Engineering and Computer Science book series (SECS, volume 769)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Enjian Bai, Bin Zhang
    Pages 9-16
  3. Wen Qiao-yan, Zhang Jie
    Pages 17-23
  4. Chuan-Kun Wu
    Pages 25-32
  5. Cunsheng Ding, Xiaojian Tian, Xuesong Wang
    Pages 33-43
  6. Zhang Zhang, Qingkuan Dong, Mian Cai
    Pages 53-57
  7. Fangguo Zhang, Reihaneh Safavi-Naini, Chin-Yin Lin
    Pages 59-66
  8. F U Xiaotong, X U Chunxiang
    Pages 89-96
  9. Zichen Li, Juanmei Zhang, Dong Zheng
    Pages 113-122
  10. Zhenjie Huang, Yumin Wang
    Pages 123-128
  11. Zhang Qiupu, Guo Baoan
    Pages 129-136
  12. Zhi Can, Qiang Li, Kefei Chen
    Pages 145-150
  13. Zheng Dong, Chen Kefei, He Liangsheng
    Pages 157-160
  14. Zheng Dong, Liu Shengli, Chen Kefei
    Pages 161-164
  15. Shengli Liu, Zheng Dong, Kefei Chen
    Pages 165-172
  16. Wenling Wu, Dengguo Feng
    Pages 173-180
  17. Zhu Hong Ru
    Pages 181-186
  18. Huafei Zhu, Yongjian Liao
    Pages 187-194
  19. Zhang Dehua, Zhang Yuqing
    Pages 209-216
  20. Chen Kai, Hu Xiaoxin, Hao Ruibing
    Pages 217-228
  21. He Dake, He Wei
    Pages 229-234
  22. Zhang Yu-Qing, Liu Xiu-Ying
    Pages 235-243
  23. Back Matter
    Pages 245-246

About this book


Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students.

Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.

Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.


Analysis DES Denial of Service Distributed Denial of Service Escrow Signcryption algorithms computer computer science information

Editors and affiliations

  • Kefei Chen
    • 1
  1. 1.Shanghai Jiaotong UniversityChina

Bibliographic information

  • DOI
  • Copyright Information Kluwer Academic Publishers 2004
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4020-7986-3
  • Online ISBN 978-1-4020-7987-0
  • Series Print ISSN 0893-3405
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Consumer Packaged Goods