国家自然科学基金(61202386)

作品数:13被引量:19H指数:3
导出分析报告
相关作者:唐明高剑邱镇龙彭红波张焕国更多>>
相关机构:武汉大学北京南瑞智芯微电子科技有限公司教育部更多>>
相关期刊:《Wuhan University Journal of Natural Sciences》《山东大学学报(理学版)》《武汉大学学报(理学版)》《Chinese Journal of Electronics》更多>>
相关主题:CRYPTOGRAPHYCRYPTANALYSISBASED_ONPROBLEMCOMPUTATIONAL更多>>
相关领域:电子电信自动化与计算机技术理学更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition被引量:1
《Chinese Journal of Electronics》2017年第6期1139-1146,共8页LIU Jinhui ZHANG Huanguo JIA Jianwei 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);the National Basic Research Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum...
关键词:CRYPTOGRAPHY Post-quantum computational cryptography Cryptanalysis Polynomial symmetrical decomposition(PSD) problem Computational complexity 
Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
《Chinese Journal of Electronics》2017年第5期947-951,共5页JIA Jianwei LIU Jinhui ZHANG Huanguo 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix...
关键词:CRYPTOGRAPHY Key exchange protocol CRYPTANALYSIS Discrete logarithm problem Linear equations 
A New Quantum Algorithm for Computing RSA Ciphertext Period被引量:2
《Wuhan University Journal of Natural Sciences》2017年第1期68-72,共5页WANG Yahui YAN Songyuan ZHANG Huanguo 
Supported by the National Natural Science Foundation of China(61303212,61202386);the State Key Program of National Natural Science of China(61332019);the Major Research Plan of the National Natural Science Foundation of China(91018008,SKLSE-2015-A-02)
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciph...
关键词:information security CRYPTOLOGY RSA cryptography quantum computing 
Cryptanalysis of a lattice based key exchange protocol被引量:1
《Science China(Information Sciences)》2017年第2期192-194,共3页Shaowu MAO Pei ZHANG Houzhen WANG Huanguo ZHANG Wanqing WU 
supported by National Natural Science Foundation of China(Grant Nos.61303212,61202385,61202386,61303024,61170080);State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);National Basic Research Program of China(Grant No.2014CB340600);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-14-002);Open Project of Beijing Key Lab of Trusted Computing(BJUT)
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the wo...
关键词:ISIS BI Cryptanalysis of a lattice based key exchange protocol 
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
《China Communications》2016年第6期217-224,共8页Jianwei Jia Jinhui Liu Huanguo Zhang 
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
关键词:CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations 
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
《Wuhan University Journal of Natural Sciences》2016年第3期209-213,共5页LIU Jinhui ZHANG Huanguo JIA Jianwei 
Supported by the National Natural Science Foundation of China(61303212,61170080,61202386);the State Key Program of National Natural Science of China(61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(91018008);Major State Basic Research Development Program of China(973 Program)(2014CB340600);the Natural Science Foundation of Hubei Province(2011CDB453,2014CFB440)
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ...
关键词:CRYPTOGRAPHY post-quantum computational cryptography key exchange protocol CRYPTANALYSIS matrix decomposition 
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems被引量:3
《Tsinghua Science and Technology》2016年第3期344-351,共8页Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang Houzhen Wang Shaowu Mao 
supported by the National Natural Science Foundation of China (Nos.61303212,61170080,61202386,61332019,U1135004,and 91018008);the National Key Basic Research and Development (973) Program of China (No.2014CB340600);the Natural Science Foundation of Hubei Province (Nos.2011CDB453 and 2014CFB440)
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been...
关键词:CRYPTOGRAPHY post-quantum cryptography public key encryption CRYPTANALYSIS linear equations 
针对RSM轻量防护方法的能量分析被引量:1
《武汉大学学报(理学版)》2016年第3期235-241,共7页唐明 彭红波 胡晓波 张焕国 
国家自然科学基金资助项目(61202386);国家重点基础研究发展计划(973)项目(2014ZX01032401-001)
以已有的轻量级RSM掩码方案为研究对象,利用掩码汉明重量的差异提出了一种新型攻击方法,并在此基础上,利用加密过程中间值的汉明重量差异进行能量分析,将该攻击方法扩展成为了掩码汉明重量无差异的对抗方法.实验结果表明,本文的攻击方...
关键词:侧信道分析 能量分析 轻量级掩码对抗 RSM掩码方案 汉明重量模型 
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem被引量:2
《Science China(Information Sciences)》2016年第5期129-139,共11页Jinhui LIU Huanguo ZHANG Jianwei JIA Houzhen WANG Shaowu MAO Wanqing WU 
supported by National Natural Science Foundation of China (Grant Nos. 61303212, 61170080, 61202386);State Key Program of National Natural Science of China (Grant Nos. 61332019, U1135004);National Key Basic Research Program of China (Grant No. 2014CB340600);Major Research Plan of the National Natural Science Foundation of China (Grant No. 91018008);Hubei Natural Science Foundation of China (Grant Nos. 2011CDB453, 2014CFB440)
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum...
关键词:CRYPTOGRAPHY post-quantum computational cryptography asymmetric cipher protocol cryptanal-ysis matrix decomposition 
Key Exchange Protocol Based on Tensor Decomposition Problem被引量:1
《China Communications》2016年第3期174-183,共10页MAO Shaowu ZHANG Huanguo WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 
supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440)
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing....
关键词:key exchange resistant quantum hard problem tensor decomposition 
检索报告 对象比较 聚类工具 使用帮助 返回顶部