cryptography相关论文
User authentication plays very role in computing system.In this thesis,firstly we studied Smart Card and user authentica......
Quantum information science is a combination of quantum mechanics and information science,which transforms computing,cod......
We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service (DBaaS)......
The 21st century is the age of information when information becomes an important strategic resource. The information obt......
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. Howeve......
In this paper,we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map.......
How many users can a quantum cryptography network support when certain services are demanded? The answer to this questio......
In this review article,we will review the recent process of quantum communications.In the past decades,there are many de......
In this paper, the security of Electronic Commerce and the security methods are introduced firstly. Then, the history of......
A number of methods for constructing new plateaued functions from known ones are presented. By properly combining the kn......
This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of or......
This paper studies the properties of orbit matrix and gives a formula to compute the number of these orbit matrices on 4......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
对基于PC构建的可信计算平台中可信计算基的构建方式进行了分析,指出通过逻辑方式构建的可信计算基存在被篡改和绕过的可能性,并提......
Lattice-based cryptosystems rely on certain lattice problems for their security,such as the shortest vector and the clos......
当我们在研究密码的安全性时,达到最优代数免疫度的布尔函数引起了大家的注意.因为为了抵抗代数攻击,一个布尔函数应该具有较高的......
耦合映象格子系统将混淆和扩散很好地结合在一起,这种结合可以被用来设计Hash函数及序列密码,极具密码学应用价值,而耦合映象格子......
Optimal set of the frequency hopping sequences can be derived from some irreducible cyclic codes.This paper determines t......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dim......
Binary sequences with large linear complexity have been found many applications in communication systems.We determine th......
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based ......
Piveteau signature scheme allows message recovery but the methodology differs from that of the Nyberg-Rueppel schemes. ......
In this paper, for the the primes p such that 3 is a divisor of p - 1, we prove a result which reduces the computation o......
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
The new generation of networked business solutions brings legacy data and applications to the world wide Web, and lets c......
Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out......
文中通过对具有无阁下信道密码系统定义的研究,指出阻止阁下信道使用的唯一方式是修改密码系统使其具有无阈下性,而且一个参与密码......
当前,由于还没有一个适于一般目的的流密码国际加密标准,流密码的设计与分析引起了广泛关注.在以前的流密码的设计中多采用线性反......
The purpose of digital image scrambling is to transform a given digital image into a rather scrambled one so as to make ......
Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e. , the dishonest private key generator......
XML加密为结构数据的安全交换提供了端到端的加密.文章介绍了现有解决方案存在的问题,提供了一个实现基于XML数据安全交换的类.......
期刊
A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the s......
A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this pa......
Patarin proposed the dragon scheme,pointed out the insecurity of the dragon algorithm with one hidden monomial and sugge......
Advances in quantum computers pose po-tential threats to the currently used public-key cryp-tographic algorithms such as......
We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic bi......
This paper presents a method for differential collision attack of reduced FOX block cipher based on 4-round distinguishi......
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hiera......
A new group signature with one time secret key is proposed. The main merits are that it only needs the trusted center is......
Based on the properties of trace functions and quadratic forms, this paper presents value distributions of Walsh spectru......
also presented....
A class of plateaued functions has been got by using the Maiorana-McFarland construction. A variety of desirable criteri......
An efficient algorithm for determining the linear complexity and the minimal polynomial of a binary sequence with period......
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing ......
We propose a cryptographic scheme based on spatiotemporal chaos of coupled map lattices (CML) ,which is based on one-tim......
卫星互联网属于新型关键基础设施,密码技术是保障卫星互联网可靠运行的基石.介绍了卫星互联网面临的安全风险,并给出了卫星互联网......
分析一个费马数分解算法中的冗余步骤,给出相应的优化结果。针对相关文献述及大费马数表示困难的问题,给出利用GMP大数运算库表示......
PGHR协议设计验证式的思想是单一化的,即一个验证式实现一个条件的验证,忽略了验证式的联合效应。文中通过利用额外常系数因子的互......