国家自然科学基金(60773092)

作品数:10被引量:30H指数:4
导出分析报告
相关作者:方习文来学嘉韩峻松卢明欣更多>>
相关机构:上海交通大学国家工程研究中心南京大学更多>>
相关期刊:《Chinese Journal of Electronics》《Science Bulletin》《科学通报》《Journal of Electronics(China)》更多>>
相关主题:IMPROVEDKEY-INSULATEDCERTIFICATELESSHASHSECURITY更多>>
相关领域:自动化与计算机技术电子电信理学交通运输工程更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
On the Security of Double-Block-Length Hash Functions with Rate 1被引量:1
《Chinese Journal of Electronics》2012年第3期566-570,共5页GONG Zheng LUO Yiyuan LAI Xuejia CHEN Kefei 
Manuscript Received July 2011; Accepted Feb. 2012. This work is supported by the National Natural Science Foundation of China (No.61100201, No.60773092, No.61073149, No. 61133014, No.60973111) and Foundation Distinguished Young Talents in Higher Education of Guangdong (No.LYMl1053).
The security of double-block-length hash functions with rate 1, which are based on a block cipher with a block length of n bits and a key length of 2n bits, was analyzed by Satoh et al. and Hirose. In this paper, we r...
关键词:CRYPTANALYSIS Block-cipher-based hash Double block length Rate-1. 
Improved zero-sum distinguisher for full round Keccak-f permutation被引量:8
《Chinese Science Bulletin》2012年第6期694-697,共4页DUAN Ming LAI XueJia 
supported by the National Natural Science Foundation of China (60573032,60773092 and 61073149);Research Fund for the Doctoral Program of Higher Education of China (20090073110027)
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition,and its inner primitive is a permutation called Keccak-f.In this paper,we observe that for the inverse of the only nonline...
关键词:置换 非线性变换 哈希函数 坐标 输出 排列 迭代 
Improved Preimage Attack on 3-Pass HAVAL被引量:2
《Journal of Shanghai Jiaotong university(Science)》2011年第6期713-721,共9页钟锦敏 来学嘉 段明 
the National Natural Science Foundation of China (Nos.60573032,60773092 and 61073149);the Research Fund for the Doctoral Program of Higher Education of China (No.20090073110027);the Fund for the Key Laboratory of Information Network Secuity of Ministry of Public Security
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and preimage attacks on 3-pass HAVAL at the complexity of 2 172 and 2 209.6,respectively,as compar...
关键词:HASH meet-in-the-middle preimage 
基于线性自组装的DNA减法模运算被引量:2
《科学通报》2010年第10期957-963,共7页方习文 来学嘉 
国家自然科学基金(批准号:60773092;60573032);教育部博士点基金(编号:20090073110027)资助项目
使用线性自组装方法,提出了两个非负二进制整数减法模运算的DNA算法.对于两个表示为n位的二进制数A与B,算法给出A-B在模2n情况下的运算结果.算法中包含反应被减数与减数大小关系的扩展借位信息,从而在计算前不必对A与B的大小关系进行预...
关键词:DNA计算 DNA减法 模运算 自组装 
基于DNA技术的非对称加密与签名方法被引量:8
《中国科学:信息科学》2010年第2期240-248,共9页来学嘉 卢明欣 秦磊 韩峻松 方习文 
国家自然科学基金(批准号:60773092;60903180)资助项目
结合现代基因工程技术和密码学技术设计了一个非对称加密与签名系统DNA-PKC,这是在生物密码研究领域的初步探索.类似于传统的公钥密码,DNA-PKC的密钥由加密钥和解密钥组成,加密者之间互相不能解密,只有解密钥的拥有者才能解密所有密文....
关键词:密码 非对称加密 数字签名 生物密码 DNA 
Certificateless key-insulated signature without random oracles被引量:6
《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》2009年第12期1790-1800,共11页Zhong-mei WAN Xue-jia LAI Jian WENG Sheng-li LIU Yu LONG Xuan HONG 
Project (Nos 60573032, 60773092, 60842002, 60873229, and 90604036) supported by the National Natural Science Foundation of China
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat...
关键词:KEY-INSULATED Key leakage CERTIFICATELESS Bilinear map 
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE被引量:4
《Journal of Electronics(China)》2009年第6期853-858,共6页Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan 
Supported by the National Natural Science Foundation of China (No. 60573032, 60773092, 90604036, 60873229, 60903178, 60672072, 60832003);Zhejiang Provincial Natural Science Foundation of China (No. Y106505)
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche...
关键词:KEY-INSULATED Proxy signature Identity-based signature Key-exposure Bilinear pairings 
On the Security of Multivariate Hash Functions被引量:1
《Journal of Shanghai Jiaotong university(Science)》2009年第2期219-222,共4页罗宜元 来学嘉 
the National Natural Science Foundationof China(Nos.60573032,60773092,90604036);the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Billet et al designed the hash function MQ-HASH and Ding et al propose...
关键词:hash functions MACS MULTIVARIATE 
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
《Journal of Shanghai Jiaotong university(Science)》2009年第1期90-93,共4页路献辉 来学嘉 何大可 
the National Natural Science Foundation of China(Nos.60573032,60773092,90604036)
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a...
关键词:public key encryption adaptive chosen ciphertext security intractable vroblem 
On Constructing Certificateless Proxy Signature from Certificateless Signature
《Journal of Shanghai Jiaotong university(Science)》2008年第6期692-694,共3页万中美 来学嘉 翁健 洪璇 龙宇 贾巍巍 
the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time ...
关键词:certificateless signature proxy signature certificateless proxy signature 
检索报告 对象比较 聚类工具 使用帮助 返回顶部