国家自然科学基金(61170080)

作品数:11被引量:16H指数:2
导出分析报告
相关期刊:《Wuhan University Journal of Natural Sciences》《Chinese Journal of Electronics》《China Communications》《Science China(Information Sciences)》更多>>
相关主题:CRYPTANALYSISCRYPTOGRAPHYBASED_ONPROBLEMQUANTUM_COMPUTATION更多>>
相关领域:电子电信自动化与计算机技术更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition被引量:1
《Chinese Journal of Electronics》2017年第6期1139-1146,共8页LIU Jinhui ZHANG Huanguo JIA Jianwei 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);the National Basic Research Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum...
关键词:CRYPTOGRAPHY Post-quantum computational cryptography Cryptanalysis Polynomial symmetrical decomposition(PSD) problem Computational complexity 
Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
《Chinese Journal of Electronics》2017年第5期947-951,共5页JIA Jianwei LIU Jinhui ZHANG Huanguo 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix...
关键词:CRYPTOGRAPHY Key exchange protocol CRYPTANALYSIS Discrete logarithm problem Linear equations 
Cryptanalysis of a lattice based key exchange protocol被引量:1
《Science China(Information Sciences)》2017年第2期192-194,共3页Shaowu MAO Pei ZHANG Houzhen WANG Huanguo ZHANG Wanqing WU 
supported by National Natural Science Foundation of China(Grant Nos.61303212,61202385,61202386,61303024,61170080);State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);National Basic Research Program of China(Grant No.2014CB340600);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-14-002);Open Project of Beijing Key Lab of Trusted Computing(BJUT)
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the wo...
关键词:ISIS BI Cryptanalysis of a lattice based key exchange protocol 
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
《China Communications》2016年第6期217-224,共8页Jianwei Jia Jinhui Liu Huanguo Zhang 
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
关键词:CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations 
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
《Wuhan University Journal of Natural Sciences》2016年第3期209-213,共5页LIU Jinhui ZHANG Huanguo JIA Jianwei 
Supported by the National Natural Science Foundation of China(61303212,61170080,61202386);the State Key Program of National Natural Science of China(61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(91018008);Major State Basic Research Development Program of China(973 Program)(2014CB340600);the Natural Science Foundation of Hubei Province(2011CDB453,2014CFB440)
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ...
关键词:CRYPTOGRAPHY post-quantum computational cryptography key exchange protocol CRYPTANALYSIS matrix decomposition 
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem被引量:1
《Tsinghua Science and Technology》2016年第3期302-311,共10页Houzhen Wang Huanguo Zhang Shaowu Mao Wanqing Wu Liqiang Zhang 
supported by the National Natural Science Foundation of China (Nos.61303212,61303024,61170080,61501333,61303024,and 61332019);the Foundation of Science and Technology on Information Assurance Laboratory (No.KJ-14-002)
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it ...
关键词:public key cryptosystem key exchange Multivariate Public Key Cryptography (MPKC) Morphism ofPolynomials (MP) problem 
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems被引量:3
《Tsinghua Science and Technology》2016年第3期344-351,共8页Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang Houzhen Wang Shaowu Mao 
supported by the National Natural Science Foundation of China (Nos.61303212,61170080,61202386,61332019,U1135004,and 91018008);the National Key Basic Research and Development (973) Program of China (No.2014CB340600);the Natural Science Foundation of Hubei Province (Nos.2011CDB453 and 2014CFB440)
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been...
关键词:CRYPTOGRAPHY post-quantum cryptography public key encryption CRYPTANALYSIS linear equations 
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem被引量:2
《Science China(Information Sciences)》2016年第5期129-139,共11页Jinhui LIU Huanguo ZHANG Jianwei JIA Houzhen WANG Shaowu MAO Wanqing WU 
supported by National Natural Science Foundation of China (Grant Nos. 61303212, 61170080, 61202386);State Key Program of National Natural Science of China (Grant Nos. 61332019, U1135004);National Key Basic Research Program of China (Grant No. 2014CB340600);Major Research Plan of the National Natural Science Foundation of China (Grant No. 91018008);Hubei Natural Science Foundation of China (Grant Nos. 2011CDB453, 2014CFB440)
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum...
关键词:CRYPTOGRAPHY post-quantum computational cryptography asymmetric cipher protocol cryptanal-ysis matrix decomposition 
Key Exchange Protocol Based on Tensor Decomposition Problem被引量:1
《China Communications》2016年第3期174-183,共10页MAO Shaowu ZHANG Huanguo WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 
supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440)
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing....
关键词:key exchange resistant quantum hard problem tensor decomposition 
A public key cryptosystem based on data complexity under quantum environment被引量:6
《Science China(Information Sciences)》2015年第11期44-54,共11页WU WanQing ZHANG HuanGuo WANG HouZhen MAO ShaoWu JIA JianWei LIU JinHui 
supported by National Natural Science Foundation of China(Grant Nos.61303212,61303024,61170080);State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);Major State Basic Research Development Program of China(Grant No.2014CB340600);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-14-002);Fundamental Research Funds for the Central Universities(Grant No.2012211020213)
Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA, EIGamal, and ECC classical public key cryptosystems. Th...
关键词:public key cryptography information security NP-complete problem complexity theory quantum computation 
检索报告 对象比较 聚类工具 使用帮助 返回顶部