the National Natural Science Foundation of China (Nos.60573032,60773092 and 61073149);the Research Fund for the Doctoral Program of Higher Education of China (No.20090073110027);the Fund for the Key Laboratory of Information Network Secuity of Ministry of Public Security
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and preimage attacks on 3-pass HAVAL at the complexity of 2 172 and 2 209.6,respectively,as compar...
Project (Nos 60573032, 60773092, 60842002, 60873229, and 90604036) supported by the National Natural Science Foundation of China
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat...
the National Natural Science Foundationof China(Nos.60573032,60773092,90604036);the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Billet et al designed the hash function MQ-HASH and Ding et al propose...
the National Natural Science Foundation of China(Nos.60573032,60773092,90604036)
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a...
the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time ...