The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...
This work is partially supported by the National Natural Science Foundation of China (No.60473020, No.60573030) and by NLMCSFC (No.9140C1103010602).
To reduce the key sizes and bandwidth, public-key cryptographic systems have been proposed using d-th order characteristic sequences generated by a Linear feedback shift register (LFSR). The paper proposes an LFSR-b...
Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) ;the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...
Ising spin system has been shown to provide a new class of error-correction code and can be used to construct public-key cryptosystems by making use of statistical mechanics. The relation between Ising spin systems an...
Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presente...
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satis...