Cryptography And Network Security Phd Thesis Essay On Social Impact Of Advances In Communications Technology
See the help center for guidance on writing a good question. Cryptography is a nice field in which not only problems to solve are a-plenty, but it is also one of these fields where individuals can make significant discoveries in a relatively short time.
A lot of computer users and developers can get along with a very low understanding of the underlying principles, but the maths are what I studied math in college, but now am a Ph. So math background can be helpful, but cryptography has its own "language".But of course, math is used in other crypto areas too.I think different crypto areas are basically depending on different underlying assumptions :) For instance, you can check functional encryption for some interesting assumptions.Additionally, we present a number of generic solutions (compilers) that can be applied to independently designed group key exchange protocols in order to enhance security thereof with respect to various goals considered by our security model.Finally, we present a concrete group key exchange protocol that provably satisfies the apparently strongest currently available formally specified security requirements.Before that, I was a postdoc in the Institute of Information Science at Academia Sinica. .pass_color_to_child_links a.u-inline.u-margin-left--xs.u-margin-right--sm.u-padding-left--xs.u-padding-right--xs.u-relative.u-absolute.u-absolute--center.u-width--100.u-flex-inline.u-flex-align-self--center.u-flex-justify--between.u-serif-font-main--regular.js-wf-loaded .u-serif-font-main--regular.amp-page .u-serif-font-main--regular.u-border-radius--ellipse.u-hover-bg--black-transparent.web_page .u-hover-bg--black-transparent:hover. I know about some interesting problems like P=NP and some stuff about (post-)quantum cryptography, but surely that's not what majority of problems are like.So, is cryptography a field where it is easy to find meaningful and interesting problems to solve?We give an analytical overview of the state-of-the-art research in this area and identify strengths and weaknesses of many previous approaches.We suggest a new approach in form of a security model those stronger definitions provide background for more confident security analyzes and proofs.