supported by the National Basic Research Program of China (2007CB311201);the National Natural Science Foundation of China (60833008, 60803149)
Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neigh...
Project supported by the National Basic Research Program(973) of China (No. 2007CB311201);the National Natural Science Foundation of China (Nos. 60970119,60803149,60833008,and 61072067)
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves co...
supported by the National Natural Science Foundation of China (60833008,60803149);the Scientific Research Foundation of Education Department of Shaanxi Provincial Government of China (11JK0503);the Youth Science and Technology Foundation of Xi’an University of Architecture and Technology (QN0831,QN1024)
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ...
supported by the National Natural Science Foundation of China (60970119, 60803149);the National Basic Research Program of China (2007CB311201);the Fundamental Research Funds for the Central Universities
Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to...
supported by the National Natural Science Foundation of China (60970119,60803149);the Youth Science and Technology Foundation of Xi’an University of Architecture and Technology (QN0831);the National Basic Research Program of China (2007CB311201)
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an ...