国家自然科学基金(60970120)

作品数:3被引量:2H指数:1
导出分析报告
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学更多>>
相关期刊:《Transactions of Nanjing University of Aeronautics and Astronautics》《High Technology Letters》更多>>
相关主题:FUNCTIONSCONSTRUCTIONSINFORMATION_SECURITYIMMUNEFUNCTION更多>>
相关领域:电子电信农业科学理学电气工程更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-3
视图:
排序:
Constructions of highly nonlinear resilient plateaud functions
《High Technology Letters》2011年第2期220-222,共3页张卫国 Chen Yuan 
Supported by the National Natural Science Foundations of China (No. 60773003, 60970120, 60903180), the Natural Science Basic Research Plan in Shanx/Province of China (No. S JOB -ZTI4 ), and the Fundamental Research Funds For the Central Universities and the 111 Project ( No. B08038 ).
The main results in this paper are to construct two classes of plateaued functions with desirable cryptographic properties. By using the Maiorana-McFarland construction, a class of highly nonlinear resilient plateaued...
关键词:CRYPTOGRAPHY boolean functions correcting codes plateaued functions resilient functions ERROR 
Constructions of Cheating Immune Secret Sharing Functions被引量:1
《High Technology Letters》2011年第1期102-105,共4页卓泽朋 Zhang Weiguo Xiao Guozhen 
Supported by the National Nature Science Foundation of China( No. 60773003,60970120).
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc...
关键词:secret sharing Boolean function correlation immune strict avalanche criterion  SAC) resilient function 
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS被引量:1
《Transactions of Nanjing University of Aeronautics and Astronautics》2009年第4期301-305,共5页陈原 陈丹 董庆宽 
Supported by the National Natural Science Foundation of China(60603010,60970120)~~
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ...
关键词:information security public-key encryption chosen ciphertext security Tag-KEM scheme 
检索报告 对象比较 聚类工具 使用帮助 返回顶部