国家自然科学基金(U1135004)

作品数:14被引量:26H指数:3
导出分析报告
相关作者:白国强蔡冰清程鹏邱爽陈弘毅更多>>
相关机构:清华大学更多>>
相关期刊:《Wuhan University Journal of Natural Sciences》《微电子学与计算机》《Chinese Journal of Electronics》《China Communications》更多>>
相关主题:CRYPTANALYSISCRYPTOGRAPHYBASED_ONQUANTUM_COMPUTATIONQUANTUM更多>>
相关领域:电子电信自动化与计算机技术更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition被引量:1
《Chinese Journal of Electronics》2017年第6期1139-1146,共8页LIU Jinhui ZHANG Huanguo JIA Jianwei 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);the National Basic Research Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum...
关键词:CRYPTOGRAPHY Post-quantum computational cryptography Cryptanalysis Polynomial symmetrical decomposition(PSD) problem Computational complexity 
Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
《Chinese Journal of Electronics》2017年第5期947-951,共5页JIA Jianwei LIU Jinhui ZHANG Huanguo 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix...
关键词:CRYPTOGRAPHY Key exchange protocol CRYPTANALYSIS Discrete logarithm problem Linear equations 
Cryptanalysis of a lattice based key exchange protocol被引量:1
《Science China(Information Sciences)》2017年第2期192-194,共3页Shaowu MAO Pei ZHANG Houzhen WANG Huanguo ZHANG Wanqing WU 
supported by National Natural Science Foundation of China(Grant Nos.61303212,61202385,61202386,61303024,61170080);State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);National Basic Research Program of China(Grant No.2014CB340600);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-14-002);Open Project of Beijing Key Lab of Trusted Computing(BJUT)
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the wo...
关键词:ISIS BI Cryptanalysis of a lattice based key exchange protocol 
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
《China Communications》2016年第6期217-224,共8页Jianwei Jia Jinhui Liu Huanguo Zhang 
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
关键词:CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations 
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
《Wuhan University Journal of Natural Sciences》2016年第3期209-213,共5页LIU Jinhui ZHANG Huanguo JIA Jianwei 
Supported by the National Natural Science Foundation of China(61303212,61170080,61202386);the State Key Program of National Natural Science of China(61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(91018008);Major State Basic Research Development Program of China(973 Program)(2014CB340600);the Natural Science Foundation of Hubei Province(2011CDB453,2014CFB440)
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ...
关键词:CRYPTOGRAPHY post-quantum computational cryptography key exchange protocol CRYPTANALYSIS matrix decomposition 
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems被引量:3
《Tsinghua Science and Technology》2016年第3期344-351,共8页Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang Houzhen Wang Shaowu Mao 
supported by the National Natural Science Foundation of China (Nos.61303212,61170080,61202386,61332019,U1135004,and 91018008);the National Key Basic Research and Development (973) Program of China (No.2014CB340600);the Natural Science Foundation of Hubei Province (Nos.2011CDB453 and 2014CFB440)
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been...
关键词:CRYPTOGRAPHY post-quantum cryptography public key encryption CRYPTANALYSIS linear equations 
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem被引量:2
《Science China(Information Sciences)》2016年第5期129-139,共11页Jinhui LIU Huanguo ZHANG Jianwei JIA Houzhen WANG Shaowu MAO Wanqing WU 
supported by National Natural Science Foundation of China (Grant Nos. 61303212, 61170080, 61202386);State Key Program of National Natural Science of China (Grant Nos. 61332019, U1135004);National Key Basic Research Program of China (Grant No. 2014CB340600);Major Research Plan of the National Natural Science Foundation of China (Grant No. 91018008);Hubei Natural Science Foundation of China (Grant Nos. 2011CDB453, 2014CFB440)
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum...
关键词:CRYPTOGRAPHY post-quantum computational cryptography asymmetric cipher protocol cryptanal-ysis matrix decomposition 
Key Exchange Protocol Based on Tensor Decomposition Problem被引量:1
《China Communications》2016年第3期174-183,共10页MAO Shaowu ZHANG Huanguo WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 
supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440)
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing....
关键词:key exchange resistant quantum hard problem tensor decomposition 
EEPROM的扫描电镜探测和探针攻击被引量:1
《微电子学与计算机》2016年第3期37-40,45,共5页程鹏 白国强 
国家自然科学基金(61472208);国家自然科学基金与广东省联合项目(U1135004)
阐述两种针对芯片的侵入式攻击方法,即扫描电镜(SEM)探测和探针攻击.攻击的目标都是从EEPROM中提取数据内容,EEPROM因为通常会存储认证信息和个人密钥等敏感信息.描述两个实验过程,第一个实验利用非易失性存储器的存储特点,对一个通用...
关键词:侵入式攻击 EEPROM SEM 内容提取 探针探测 
Towards Fast Repackaging and Dynamic Authority Management on Android
《Wuhan University Journal of Natural Sciences》2016年第1期1-9,共9页SONG Jun ZHANG Mohan HAN Chunling WANG Kaixin ZHANG Huanguo 
Supported by the National Natural Science Foundation of China(61303212,61332019,U1135004);the Hubei Provincial Natural Science Foundation of China(2014CFB192);the Fundamental Research Founds for National University,China University of Geosciences(Wuhan)(CUGL130234)
In order to enhance the security of Android applications, we propose a repackaging and dynamic authority management scheme based on Android application reinforcement methods Instead of using root privileges and system...
关键词:Android security repackaging root privileges native C-level interception 
检索报告 对象比较 聚类工具 使用帮助 返回顶部