搜索筛选:
搜索耗时3.6601秒,为你在为你在102,285,761篇论文里面共找到 9 篇相符的论文内容
类      型:
[期刊论文] 作者:MAO Shaowu,ZHANG Huanguo,WU Wa, 来源:中国通信:英文版 年份:2016
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been cons...
[期刊论文] 作者:MAO Shaowu ZHANG Huanguo WU Wa, 来源:中国通信:英文版 年份:2014
[期刊论文] 作者:MAO Shaowu,ZHANG Huanguo,ZHANG Pe,SONG Jun,LIU Jinhu, 来源:中国通信(英文版) 年份:2016
The hardness of tensor decomposition problem has many achievements,but limited applications in cryptography,and the tensor decomposition problem has been consid...
[期刊论文] 作者:MAO Shaowu,ZHANG Huanguo,WU Wanqing,LIU Jinhui,LI Shuanbao,Wang Houzhen, 来源:中国通信 年份:2014
[期刊论文] 作者:WU WanQing,ZHANG HuanGuo,WANG HouZhen,MAO ShaoWu,JIA JianWei,LIU JinHui,, 来源:Science China(Information Sciences) 年份:2015
Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA...
[会议论文] 作者:Mao Shaowu,Zhang Huanguo,Wanqing Wu,Wang Houzhen,Song jun,Liu jinhui, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Jia Jianwei,Wang Houzhen,Wu Wanqing,Mao Shaowu,Liu Jinhui,Zhang Huanguo, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Liu Jinhui,Zhang Huanguo,Jia Jianwei,Wang Houzhen,Mao Shaowu,Wu Wanqing, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
During the last decades, many public key cryptosystems based on non-abelian algebraic structures were proposed, such as cryptosytems based on inner automorphism groups, general linear groups and braid...
[会议论文] 作者:Liu Jinhui,Jia Jianwei,Wu Shuomei,Zhang Huanguo,Wang Houzhen,Mao Shaowu, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Before going into details we would like to mention that non-abelian algebraic structures have already been used in a cryptographic context....
相关搜索: