相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Frontiers of Computer Science》《Wuhan University Journal of Natural Sciences》《Probability, Uncertainty and Quantitative Risk》更多>>
In this work,we propose a stateless blockchain called CompactChain,which compacts the entire state of the UTXO(Unspent Transaction Output)based blockchain systems into two RSA accumulators.The first accumulator is cal...
supported by the National Key R&D Program of China(No.2017YFB0802300);the Key Research and Development Project of Sichuan Province(No.2020YFG0307,No.2018TJPT0012);the Key Research and Development Project of Chengdu(No.2019-YF05-02028-GX).
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd...
The security of modular power algorithm is a very important research topic, which is the core operation of public key cryptography algorithm. Since the first timing attack was public in 1996, the attacker can exploit ...
Since 2005, there has been a huge growth in the use of engineered control pulses to perform desired quantum operations in systems such as nuclear magnetic resonance quantum information processors. These approaches, wh...
Risks embedded in asset price dynamics are taken to be accumulations of surprise jumps.A Markov pure jump model is formulated on making variance gamma parameters deterministic functions of the price level.Estimation i...
This paper presents a brief demonstration of Schulz’s first conjecture, which sets the upper and lower limits on the length of the shortest chain of addition. Two methods of the upper limit are demonstrated;the secon...
supported in part by National Natural Science Foundation of China Project(Grant No.60873216); Scientific and Technological Research Priority Projects of Sichuan Province(Grant No. 2012GZ0017)
The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding metho...
This paper presents a brief demonstration of Scholz’s third conjecture [1] for n numbers such that their minimum chain addition is star type [2]. The demonstration is based on the proposal of an algorithm that takes ...
This paper describes and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator (prim...
Supported by the National Natural Science Foundation of China (70671096);Jiangsu Teachers University of Technology (KYY08004,KYQ09002)
By using the minimal polynomial of ergodic matrix and the property of polynomial over finite field,we present a polynomial time algorithm for the two-side exponentiation problem about ergodic matrices over finite fie...