CRYPTOLOGY

作品数:25被引量:89H指数:5
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:郭璠蔡自兴更多>>
相关机构:中南大学更多>>
相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Chinese Journal of Electronics》《Advances in Internet of Things》《Science China(Information Sciences)》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家教育部博士点基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
《Computers, Materials & Continua》2024年第1期589-616,共28页Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 
Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear...
关键词:Replay attack MALWARE message attack file encryption CRYPTOLOGY data security 
k-Order Fibonacci Polynomials on AES-Like Cryptology
《Computer Modeling in Engineering & Sciences》2022年第4期277-293,共17页Mustafa Asci Suleyman Aydinyuz 
This work is supported by the Scientific Research Project(BAP)2020FEBE009,Pamukkale University,Denizli,Turkey.
The Advanced Encryption Standard(AES)is the most widely used symmetric cipher today.AES has an important place in cryptology.Finite field,also known as Galois Fields,are cornerstones for understanding any cryptography...
关键词:Fibonacci numbers Fibonacci polynomials k-order Fibonacci polynomials Fibonacci matrix k-order Fibonacci polynomial matrix Galois field 
Quantum Algorithm for Attacking RSA Based on Fourier Transform and Fixed-Point被引量:1
《Wuhan University Journal of Natural Sciences》2021年第6期489-494,共6页WANG Yahui ZHANG Huanguo 
Supported by Nanhu Scholars Program for Young Scholars of Xinyang Normal University。
Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplicative group Z_(n)^(*),which can be used to factor the integer n by computing gcd(a^(r/2)±1,n),and henc...
关键词:information security CRYPTOLOGY RSA fixed-point quantum computing 
A New Quantum Algorithm for Computing RSA Ciphertext Period被引量:2
《Wuhan University Journal of Natural Sciences》2017年第1期68-72,共5页WANG Yahui YAN Songyuan ZHANG Huanguo 
Supported by the National Natural Science Foundation of China(61303212,61202386);the State Key Program of National Natural Science of China(61332019);the Major Research Plan of the National Natural Science Foundation of China(91018008,SKLSE-2015-A-02)
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciph...
关键词:information security CRYPTOLOGY RSA cryptography quantum computing 
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys被引量:1
《Science China(Information Sciences)》2014年第9期122-131,共10页FANG XiWen LAI XueJia 
supported by the National Natural Science Foundation of China(Grant Nos.61272440,61073149);Research Fund for the Doctoral Program of Higher Education of China(Grant No.20090073110027);State Key Laboratory of ASIC&System(Grant No.11KF0020);Key Lab of Information Network Security,Ministry of Public Security(Grant No.C11603);Scholarship Award for Excellent Doctoral Student granted by Ministry of Education
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption scheme. In our scheme,new users can join dynamically without modification of other users' decryption keys. Either the ciphertext or the d...
关键词:DNA cryptography dynamic broadcast encryption group oriented cryptography DNA chip CRYPTOLOGY 
Computing the k-error joint linear complexity of binary periodic multisequences
《The Journal of China Universities of Posts and Telecommunications》2013年第6期96-101,共6页LI Fu-lin ZHU Shi-xin 
supported by the National Natural Science Foundation of China (61370089);the Fundamental Research Funds for the Central Universities (2012HGBZ0622)
Complexity measures for multisequences over finite fields, such as the joint linear complexity and the k-error joint linear complexity, play an important role in cryptology. In this paper we study a fast algorithm, pr...
关键词:CRYPTOLOGY multisequence algorithm joint linear complexity k-error joint linear complexity 
Evolutionary cryptography against multidimensional linear cryptanalysis被引量:5
《Science China(Information Sciences)》2011年第12期2565-2577,共13页ZHANG HuanGuo LI ChunLei TANG Ming 
supported by the National Natural Science Foundation of China(Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t...
关键词:information security CRYPTOLOGY evolutionary cryptosystem CRYPTANALYSIS multidimensional linear cryptanalysis 
Capability of evolutionary cryptosystems against differential cryptanalysis被引量:11
《Science China(Information Sciences)》2011年第10期1991-2000,共10页ZHANG HuanGuo 1,2 ,LI ChunLei 1,2 & TANG Ming 1,2 1 School of Computer,Wuhan University,Wuhan 430072,China 2 Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072,China 
supported by the National Natural Science Foundation of China (Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem. This paper studies its security level resisting against differential cryptanalysis. It is shown that the evolutionary cryptosystem possesses higher resistance than ...
关键词:information security CRYPTOLOGY evolutionary cryptosystem CRYPTANALYSIS differential cryptanalysis. 
Differential Attack on Five Rounds of the SC2000 Block Cipher被引量:1
《Journal of Computer Science & Technology》2011年第4期722-731,共10页吕继强 
supported by the French ANR Project SAPHIR Ⅱ
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128-bit user key is used. It is a CRYPTREC recommended e-government cipher in Japan. In...
关键词:CRYPTOLOGY block cipher SC2000 differential cryptanalysis 
Secured Electronic Voting Protocol Using Biometric Authentication
《Advances in Internet of Things》2011年第2期38-50,共13页Kalaichelvi Visvalingam R. M. Chandrasekaran 
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenienc...
关键词:ONLINE VOTING CRYPTOLOGY PRIVACY SECURITY and Internet 
检索报告 对象比较 聚类工具 使用帮助 返回顶部