搜索筛选:
搜索耗时0.0753秒,为你在为你在102,285,761篇论文里面共找到 29 篇相符的论文内容
类      型:
[期刊论文] 作者:Huanguo Zhang, 来源:中国通信(英文版) 年份:2018
With the development and widespread applicationof information technology and industry, the hu-man society has entered into the information age and people live a...
[期刊论文] 作者:Huanguo Zhang,Yi Mu,, 来源:中国通信 年份:2016
With rapid development and wide application of information technology,mankind is entering into an information age.The world where people live and work has b...
[期刊论文] 作者:Guoxiang Hu,Huanguo Zhang,Liju, 来源:清华大学学报:自然科学英文版 年份:2014
The weight hierarchy of a [n; kI q] linear code C over Fq is the sequence(d1,… dr,… dk), where dr is the smallest support weight of an r-dimensional subcode o...
[期刊论文] 作者:Huanguo Zhang,Zhaoxu Ji,Houzhe, 来源:中国通信:英文版 年份:2019
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computer...
[期刊论文] 作者:Yahui Wang,Huanguo Zhang,Houzh, 来源:中国通信:英文版 年份:2018
[期刊论文] 作者:CHEN Lu,ZHANG Huanguo,ZHANG Li, 来源:武汉大学学报:自然科学英文版 年份:2008
Facing the increasing security issues in P2P networks,a scheme for resource sharing using trusted computing technolo-gies is proposed in this paper. We advance...
[期刊论文] 作者:Jianwei Jia,Jinhui Liu,Huanguo Zhang,, 来源:中国通信 年份:2016
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarit...
[期刊论文] 作者:Yahui Wang,Huanguo Zhang,Houzhen Wang, 来源:中国通信(英文版) 年份:2018
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the...
[期刊论文] 作者:Guoxiang Hu,Huanguo Zhang,Lijun Wang,Zhe Dong,, 来源:Tsinghua Science and Technology 年份:2014
The weight hierarchy of a [n; kI q] linear code C over Fq is the sequence(d1,… dr,… dk), where dr is the smallest support weight of an r-dimensional subcode o...
[期刊论文] 作者:Yu Liang,Guojun Peng,Yuan Luo,Huanguo Zhang, 来源:中国通信(英文版) 年份:2016
Defending against ret-oriented programing (ROP) attacks is extremely challenging for mod operating systems.As the most popular mobile OS running on ARM,Android...
[期刊论文] 作者:Yonggan Li,Xueguang Zhou,Yan Sun,Huanguo Zhang, 来源:中国通信(英文版) 年份:2016
Information content security is a branch of cyberspace security.How to effectively manage and use Weibo comment information has become a research focus in the f...
[期刊论文] 作者:Huanguo Zhang,Zhaoxu Ji,Houzhen Wang,Wanqing Wu, 来源:中国通信(英文版) 年份:2019
The security of classical cryptog-raphy based on computational complexity as-sumptions has been severely challenged with the rapid development of quantum comput...
[会议论文] 作者:Li Li,Haibo Sun,Rui Xue,Huanguo Zhang, 来源:第八届中国密码学学术会议 年份:2004
如何保护密钥交换协议中交换的秘密信息的安全性是一个基本而重要的问题。本文提出一个新的模型,称为项节点图模型,用来分析协议中秘密信息之间的关系以及相关的秘密性。图上的节点表示协议中所用的消息,节点之间的边描述项之间的因果关系。在这个框架下,秘密性的分......
[期刊论文] 作者:Shaowu MAO,Pei ZHANG,Houzhen WANG,Huanguo ZHANG,Wanqing WU,, 来源:Science China(Information Sciences) 年份:2017
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],...
[期刊论文] 作者:MAO Shaowu,ZHANG Huanguo,ZHANG Pe,SONG Jun,LIU Jinhu, 来源:中国通信(英文版) 年份:2016
The hardness of tensor decomposition problem has many achievements,but limited applications in cryptography,and the tensor decomposition problem has been consid...
[期刊论文] 作者:Houzhen Wang,Huanguo Zhang,Shaowu Mao,Wanqing Wu,Liqiang Zhang,, 来源:Tsinghua Science and Technology 年份:2016
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography(MPKC), which is considered to be an important...
[会议论文] 作者:Jianwei Jia,Houzhen Wang,Huanguo Zhang,Shijia Wang,Jinhui Liu, 来源:第十二届中国可信计算与信息安全学术会议 年份:2018
ElGamal cryptography is one of the most important Public Key Cryptography(PKC)since Diffie-hellman exchangs was proposed,however these PKCs which are based on the hard problems that dis-crete logarith...
[期刊论文] 作者:Shungan Zhou,Ruiying Du,Jing Chen,Hua Deng,Jian Shen,Huanguo Zhang, 来源:中国通信(英文版) 年份:2016
Data sharing is a main application of cloud computing.Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud.H...
[期刊论文] 作者:Jinhui Liu,Jianwei Jia,Huanguo Zhang,Rongwei Yu,Yong Yu,Wangqing Wu, 来源:中国通信(英文版) 年份:2018
A cryptosystem with non-commu-tative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its v...
[期刊论文] 作者:Jinhui LIU,Huanguo ZHANG,Jianwei JIA,Houzhen WANG,Shaowu MAO,Wanqing WU,, 来源:Science China(Information Sciences) 年份:2016
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC,and El Gamal that are based on the difficulty of factorization or ta...
相关搜索: