cryptographic相关论文
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure i......
With the development of data intensive application, such as multimedia, data warehouse, and online analysis processing, ......
Coupled map lattices (CML) have been recently used to construct ciphers. However, the complicated operations on real num......
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party com......
Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pai......
σ-LFSR是一基于字的LFSR模型,它能够充分利用现代CPU的特点,具有结构简单、适合软件快速实现的特点.在实际应用中,本原σ-LFSR最......
介绍了抽象状态机(ASM),建立了基于这种形式化方法的协议描述于验证的环境,并建立了一般意义上的入侵者模型.作为应用实例,给出了Hels......
提出了可重构密码处理器内部连接网络的连通性、网络宽度、网络规模等概念和设计过程中应该遵循的一些设计原则,给出了全互联、单总......
针对粗粒度可重构密码逻辑阵列密码算法映射周期长且性能不高的问题,该文通过构建粗粒度可重构密码逻辑阵列参数化模型,以密码算法......
随着RFID技术的广泛应用,出现了一系列的安全问题,如窃听、重放攻击等等。这些安全问题严重阻碍了RFID技术进一步的发展。鉴于此,......
可重构密码协处理器是采用可重构体系结构的思想和方法设计而成的,用于对数据进行加/解密处理的集成电路芯片,它能够灵活、快速地......
The variety of encryption mechanism and algorithms which were conventionally used have some limitations.The kernel opera......
提出把Fourier分析理论应用于随机序列发生器研制中,改变原来的输出,设计出一种新的高速随机序列发生器。又提出可以应用该理论快速......