搜索筛选:
搜索耗时0.0897秒,为你在为你在102,285,761篇论文里面共找到 10 篇相符的论文内容
类      型:
[期刊论文] 作者:Yahui Wang,Huanguo Zhang,Houzhen Wang, 来源:中国通信(英文版) 年份:2018
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the...
[期刊论文] 作者:Huanguo Zhang,Zhaoxu Ji,Houzhen Wang,Wanqing Wu, 来源:中国通信(英文版) 年份:2019
The security of classical cryptog-raphy based on computational complexity as-sumptions has been severely challenged with the rapid development of quantum comput...
[期刊论文] 作者:Shaowu MAO,Pei ZHANG,Houzhen WANG,Huanguo ZHANG,Wanqing WU,, 来源:Science China(Information Sciences) 年份:2017
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],...
[期刊论文] 作者:Houzhen Wang,Huanguo Zhang,Shaowu Mao,Wanqing Wu,Liqiang Zhang,, 来源:Tsinghua Science and Technology 年份:2016
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography(MPKC), which is considered to be an important...
[会议论文] 作者:Jianwei Jia,Houzhen Wang,Huanguo Zhang,Shijia Wang,Jinhui Liu, 来源:第十二届中国可信计算与信息安全学术会议 年份:2018
ElGamal cryptography is one of the most important Public Key Cryptography(PKC)since Diffie-hellman exchangs was proposed,however these PKCs which are based on the hard problems that dis-crete logarith...
[期刊论文] 作者:Jinhui LIU,Huanguo ZHANG,Jianwei JIA,Houzhen WANG,Shaowu MAO,Wanqing WU,, 来源:Science China(Information Sciences) 年份:2016
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC,and El Gamal that are based on the difficulty of factorization or ta...
[期刊论文] 作者:Jinhui Liu,Aiwan Fan,Jianwei Jia,Huanguo Zhang,Houzhen Wang,Shaowu Mao,, 来源:Tsinghua Science and Technology 年份:2016
Advances in quantum computers threaten to break public-key cryptosystems(e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete l...
[期刊论文] 作者:Wanqing WU,Huanguo ZHANG,Houzhen WANG,Shaowu MAO,Shuomei WU,Haiqing HAN,, 来源:Science China(Information Sciences) 年份:2016
The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYPTO 2001, Paeng(2001) presented a MOR cryptosystem using a non-abe...
[会议论文] 作者:Jinhui Liu,Yong Yu,Jianwei Jia,Shijia Wang,Houzhen Wang,Huanguo zhang, 来源:第十二届中国可信计算与信息安全学术会议 年份:2018
Recently,with the rapid development of Internet of Things(IoT),vehicular ad hoc network(VANET),as a typical application of IoT,brings more and more intelligent and convenient services to an increasing...
[期刊论文] 作者:Jinhui Liu,Yong Yu,Jianwei Jia,Shijia Wang,Peiru Fan,Houzhen Wang,Huanguo Zhang,, 来源:Tsinghua Science and Technology 年份:2019
Amidst the rapid development of the Internet of Things(IoT), Vehicular Ad-Hoc NETwork(VANET), a typical IoT application, are bringing an ever-larger number of intelligent and convenient services to th...
相关搜索: