国家自然科学基金(s60573032)

作品数:5被引量:9H指数:2
导出分析报告
相关期刊:《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》《Journal of Shanghai Jiaotong university(Science)》更多>>
相关主题:CERTIFICATELESSSECURITYWITHOUT_RANDOM_ORACLESKEY-INSULATEDIMPROVED更多>>
相关领域:自动化与计算机技术电子电信交通运输工程机械工程更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-5
视图:
排序:
Improved Preimage Attack on 3-Pass HAVAL被引量:2
《Journal of Shanghai Jiaotong university(Science)》2011年第6期713-721,共9页钟锦敏 来学嘉 段明 
the National Natural Science Foundation of China (Nos.60573032,60773092 and 61073149);the Research Fund for the Doctoral Program of Higher Education of China (No.20090073110027);the Fund for the Key Laboratory of Information Network Secuity of Ministry of Public Security
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and preimage attacks on 3-pass HAVAL at the complexity of 2 172 and 2 209.6,respectively,as compar...
关键词:HASH meet-in-the-middle preimage 
Certificateless key-insulated signature without random oracles被引量:6
《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》2009年第12期1790-1800,共11页Zhong-mei WAN Xue-jia LAI Jian WENG Sheng-li LIU Yu LONG Xuan HONG 
Project (Nos 60573032, 60773092, 60842002, 60873229, and 90604036) supported by the National Natural Science Foundation of China
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat...
关键词:KEY-INSULATED Key leakage CERTIFICATELESS Bilinear map 
On the Security of Multivariate Hash Functions被引量:1
《Journal of Shanghai Jiaotong university(Science)》2009年第2期219-222,共4页罗宜元 来学嘉 
the National Natural Science Foundationof China(Nos.60573032,60773092,90604036);the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Billet et al designed the hash function MQ-HASH and Ding et al propose...
关键词:hash functions MACS MULTIVARIATE 
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
《Journal of Shanghai Jiaotong university(Science)》2009年第1期90-93,共4页路献辉 来学嘉 何大可 
the National Natural Science Foundation of China(Nos.60573032,60773092,90604036)
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a...
关键词:public key encryption adaptive chosen ciphertext security intractable vroblem 
On Constructing Certificateless Proxy Signature from Certificateless Signature
《Journal of Shanghai Jiaotong university(Science)》2008年第6期692-694,共3页万中美 来学嘉 翁健 洪璇 龙宇 贾巍巍 
the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time ...
关键词:certificateless signature proxy signature certificateless proxy signature 
检索报告 对象比较 聚类工具 使用帮助 返回顶部