Supported by the National Natural Science Foundation of China(11271363,60970152);National 973 Program of China(2011CB302400);Strategic Priority Research Program of the Chinese Academy of Sciences(XDA06010701)
supported by National Natural Science Foundation of China(Grant No.60970152);IIE's Research Project on Cryptography(Grant No.Y3Z0011102);the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA06010701);National Key Basic Research Program of China(973 Program)(Grant No.2011CB302400)
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func...
supported by National Key Basic Research Project of China (Grant No.2011CB302400);National Natural Science Foundation of China (Grant Nos. 10971217, 60970152 and 61121062);IIE'S Research Project on Cryptography (Grant No. Y3Z0013102)
An efficient algorithm is proposed for factoring polynomials over an algebraic extension field defined by a polynomial ring modulo a maximal ideal. If the maximal ideal is given by its CrSbner basis, no extra Grbbner ...
supported by National Basic Research Program of China (973 Program)(Grant No. 2011CB302400);National Natural Science Foundation of China (Grant No. 60970152);Grand Project of Institute of Software (Grant No. YOCX285056)
The isomorphism of polynomials (IP), one of the hard problems in multivariate public key cryptography induces an equivalence relation on a set of systems of polynomials. Then the enumeration problem of IP consists o...
supported by National Natural Science Foundation of China (Grant Nos.10971246, 60970152)
Algebraic immunity has been considered as one of cryptographically significant properties for Boolean functions. In this paper, we study ∑d-1 i=0 (ni)-weight Boolean functions with algebraic immunity achiev-ing the m...