国家自然科学基金(91018008)

作品数:28被引量:107H指数:5
导出分析报告
相关作者:张焕国贾建卫刘金会吴万青李晓丽更多>>
相关机构:武汉大学教育部南通大学中国人民解放军海军工程大学更多>>
相关期刊:《科技通报》《计算机研究与发展》《China Communications》《Science China(Information Sciences)》更多>>
相关主题:CRYPTOGRAPHY密码学CRYPTANALYSIS信息安全量子计算更多>>
相关领域:自动化与计算机技术电子电信理学天文地球更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
基于e次根攻击RSA的量子算法被引量:1
《工程科学与技术》2018年第2期163-169,共7页王亚辉 张焕国 王后珍 
国家自然科学基金重点资助项目(61332019);国家自然科学基金资助项目(61402339;61202386);国家自然科学基金重大项目资助(91018008);国家重点基础研究发展规划资助项目(2014CB340601);国家密码发展基金资助项目(MMJJ201701304)
量子算法的出现给现有的公钥密码体制带来了严峻挑战,其中,最具威胁的是Shor算法。Shor算法能够在多项式时间内求解整数分解问题和离散对数问题,使得当前应用广泛的RSA、ElGamal和ECC等公钥密码体制在量子计算环境下不再安全,因此研究...
关键词:信息安全 密码学 RSA密码 量子计算 
基于方程求解与相位估计攻击RSA的量子算法被引量:3
《计算机学报》2017年第12期2688-2699,共12页王亚辉 张焕国 吴万青 韩海清 
国家自然科学基金重点项目(61332019);国家自然科学基金(61303212;61202386);国家自然科学基金重大项目(91018008)资助;国家"九七三"重点基础研究发展(2014CB340601)~~
量子计算的发展对现有的公钥密码体制提出了严峻的挑战,利用Shor算法就可攻击公钥密码RSA,ELGamal等.因此,研究量子计算环境下的密码破译有重大意义.经典的因子分解算法是通过求解同余方程α~2≡β~2(modn)实现的.据查证,目前还没有求...
关键词:信息安全 密码学 RSA密码体制 量子计算 
Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition被引量:1
《Chinese Journal of Electronics》2017年第6期1139-1146,共8页LIU Jinhui ZHANG Huanguo JIA Jianwei 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);the National Basic Research Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum...
关键词:CRYPTOGRAPHY Post-quantum computational cryptography Cryptanalysis Polynomial symmetrical decomposition(PSD) problem Computational complexity 
Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
《Chinese Journal of Electronics》2017年第5期947-951,共5页JIA Jianwei LIU Jinhui ZHANG Huanguo 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix...
关键词:CRYPTOGRAPHY Key exchange protocol CRYPTANALYSIS Discrete logarithm problem Linear equations 
Image Forgery Detection Using Segmentation and Swarm Intelligent Algorithm被引量:2
《Wuhan University Journal of Natural Sciences》2017年第2期141-148,共8页ZHAO Fei SHI Wenchang QIN Bo LIANG Bin 
Supported by the National Natural Science Foundation of China(61472429,61070192,91018008,61303074,61170240);the National High Technology Research Development Program of China(863 Program)(2007AA01Z414);the National Science and Technology Major Project of China(2012ZX01039-004);the Beijing Natural Science Foundation(4122041)
Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm ...
关键词:copy-move forgery detection scale invariant features transform (SIFT) swarm intelligent algorithm particle swarm optimization 
A New Quantum Algorithm for Computing RSA Ciphertext Period被引量:2
《Wuhan University Journal of Natural Sciences》2017年第1期68-72,共5页WANG Yahui YAN Songyuan ZHANG Huanguo 
Supported by the National Natural Science Foundation of China(61303212,61202386);the State Key Program of National Natural Science of China(61332019);the Major Research Plan of the National Natural Science Foundation of China(91018008,SKLSE-2015-A-02)
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciph...
关键词:information security CRYPTOLOGY RSA cryptography quantum computing 
破解R.S.Bhalerao公钥加密方案
《武汉大学学报(理学版)》2016年第5期425-428,共4页贾建卫 刘金会 吴朔媚 张焕国 康遥 
国家自然科学基金资助项目(61303212;61170080;61202386);国家自然科学基金资助重点项目(61332019;U1135004);国家自然科学基金资助重大项目(91018008);国家重点基础研究发展计划(973)项目(2014CB340600);湖北省自然基金项目(2011CDB453;2014CFB440)
R.S.Bhalerao等人设计了建立在矩阵群上的R.S.公钥加密方案.本文利用矩阵的一些性质,在不需要找到私钥的情况下,多项式时间内恢复出明文,并给出了方法描述和时间复杂度分析,破解了R.S.Bhalerao公钥加密方案.
关键词:密码学 公钥加密 密码分析 云计算 线性方程组 
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
《China Communications》2016年第6期217-224,共8页Jianwei Jia Jinhui Liu Huanguo Zhang 
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
关键词:CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations 
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
《Wuhan University Journal of Natural Sciences》2016年第3期209-213,共5页LIU Jinhui ZHANG Huanguo JIA Jianwei 
Supported by the National Natural Science Foundation of China(61303212,61170080,61202386);the State Key Program of National Natural Science of China(61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(91018008);Major State Basic Research Development Program of China(973 Program)(2014CB340600);the Natural Science Foundation of Hubei Province(2011CDB453,2014CFB440)
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ...
关键词:CRYPTOGRAPHY post-quantum computational cryptography key exchange protocol CRYPTANALYSIS matrix decomposition 
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems被引量:3
《Tsinghua Science and Technology》2016年第3期344-351,共8页Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang Houzhen Wang Shaowu Mao 
supported by the National Natural Science Foundation of China (Nos.61303212,61170080,61202386,61332019,U1135004,and 91018008);the National Key Basic Research and Development (973) Program of China (No.2014CB340600);the Natural Science Foundation of Hubei Province (Nos.2011CDB453 and 2014CFB440)
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been...
关键词:CRYPTOGRAPHY post-quantum cryptography public key encryption CRYPTANALYSIS linear equations 
检索报告 对象比较 聚类工具 使用帮助 返回顶部