supported by the National Natural Science Foundation of China(Grant Nos.61202386,60970116,60970115,61003268,61003267)
It has been widely accepted that the security cryptosystems should be only dependent on the security of their secret keys. However, there are still secret ciphers with unknown components in their commercial applicatio...
sponsored by National Natural Science Foundation of China (Grant Nos. 60970116, 60970115,90718006, 61003267)
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system security. The existing SCAs generally require the knowledge of the corresponding crypto- graphic algori...
supported by the National Natural Science Foundation of China(Grant Nos.60970115,60970116,61003267,61003268,61003214);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008)
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow...
supported by the National High-Tech Research & Development Program of China (Grant No.2007AA01Z4);the National Natural Science Foundation of China (Grants Nos. 60970115, 60970116);the Open Project of Key Laboratory of Mathematics Mechanization (Grant No. KLMM0903)
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren...
Supported by the National Natural Science Foundation of China (60673071, 60970115, 60970116)
This paper design the P-permutation with cryptologic properties beyond certain bound based on BCH code and Goppa code, which is the generalization of the design method utilizing the maximum distance separable (MDS) ...
supported by the National High-Tech Research & Development Program of China (Grant Nos.2006AA01Z442, 2007AA01Z411); the National Natural Science Foundation of China (Grant Nos. 60673071,6097115, 60970116)
This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPKCs). E...