CRYPTOLOGY

作品数:26被引量:89H指数:5
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:郭璠蔡自兴更多>>
相关机构:中南大学更多>>
相关期刊:《Wuhan University Journal of Natural Sciences》《Journal of Donghua University(English Edition)》《Science China(Information Sciences)》《Journal of Computer Science & Technology》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家教育部博士点基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
上海交通大学郁昱团队3篇论文入选国际密码学刊物与会议
《信息网络安全》2025年第3期437-437,共1页
近期,上海交通大学计算机学院郁昱教授团队在密码学领域取得突破,其中一项研究成果被国际密码学会会刊《Journal of Cryptology》录用,另外两项研究成果被密码学三大旗舰会议之一的欧洲密码学年会(EUROCRYPT 2025)录用。发表于《Journal...
关键词:Journal of Cryptology 密码学 上海交通大学 郁昱团队 
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
《Computers, Materials & Continua》2024年第1期589-616,共28页Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 
Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear...
关键词:Replay attack MALWARE message attack file encryption CRYPTOLOGY data security 
k-Order Fibonacci Polynomials on AES-Like Cryptology
《Computer Modeling in Engineering & Sciences》2022年第4期277-293,共17页Mustafa Asci Suleyman Aydinyuz 
This work is supported by the Scientific Research Project(BAP)2020FEBE009,Pamukkale University,Denizli,Turkey.
The Advanced Encryption Standard(AES)is the most widely used symmetric cipher today.AES has an important place in cryptology.Finite field,also known as Galois Fields,are cornerstones for understanding any cryptography...
关键词:Fibonacci numbers Fibonacci polynomials k-order Fibonacci polynomials Fibonacci matrix k-order Fibonacci polynomial matrix Galois field 
Quantum Algorithm for Attacking RSA Based on Fourier Transform and Fixed-Point被引量:1
《Wuhan University Journal of Natural Sciences》2021年第6期489-494,共6页WANG Yahui ZHANG Huanguo 
Supported by Nanhu Scholars Program for Young Scholars of Xinyang Normal University。
Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplicative group Z_(n)^(*),which can be used to factor the integer n by computing gcd(a^(r/2)±1,n),and henc...
关键词:information security CRYPTOLOGY RSA fixed-point quantum computing 
A New Quantum Algorithm for Computing RSA Ciphertext Period被引量:2
《Wuhan University Journal of Natural Sciences》2017年第1期68-72,共5页WANG Yahui YAN Songyuan ZHANG Huanguo 
Supported by the National Natural Science Foundation of China(61303212,61202386);the State Key Program of National Natural Science of China(61332019);the Major Research Plan of the National Natural Science Foundation of China(91018008,SKLSE-2015-A-02)
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciph...
关键词:information security CRYPTOLOGY RSA cryptography quantum computing 
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys被引量:1
《Science China(Information Sciences)》2014年第9期122-131,共10页FANG XiWen LAI XueJia 
supported by the National Natural Science Foundation of China(Grant Nos.61272440,61073149);Research Fund for the Doctoral Program of Higher Education of China(Grant No.20090073110027);State Key Laboratory of ASIC&System(Grant No.11KF0020);Key Lab of Information Network Security,Ministry of Public Security(Grant No.C11603);Scholarship Award for Excellent Doctoral Student granted by Ministry of Education
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption scheme. In our scheme,new users can join dynamically without modification of other users' decryption keys. Either the ciphertext or the d...
关键词:DNA cryptography dynamic broadcast encryption group oriented cryptography DNA chip CRYPTOLOGY 
Computing the k-error joint linear complexity of binary periodic multisequences
《The Journal of China Universities of Posts and Telecommunications》2013年第6期96-101,共6页LI Fu-lin ZHU Shi-xin 
supported by the National Natural Science Foundation of China (61370089);the Fundamental Research Funds for the Central Universities (2012HGBZ0622)
Complexity measures for multisequences over finite fields, such as the joint linear complexity and the k-error joint linear complexity, play an important role in cryptology. In this paper we study a fast algorithm, pr...
关键词:CRYPTOLOGY multisequence algorithm joint linear complexity k-error joint linear complexity 
Evolutionary cryptography against multidimensional linear cryptanalysis被引量:5
《Science China(Information Sciences)》2011年第12期2565-2577,共13页ZHANG HuanGuo LI ChunLei TANG Ming 
supported by the National Natural Science Foundation of China(Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t...
关键词:information security CRYPTOLOGY evolutionary cryptosystem CRYPTANALYSIS multidimensional linear cryptanalysis 
Capability of evolutionary cryptosystems against differential cryptanalysis被引量:11
《Science China(Information Sciences)》2011年第10期1991-2000,共10页ZHANG HuanGuo 1,2 ,LI ChunLei 1,2 & TANG Ming 1,2 1 School of Computer,Wuhan University,Wuhan 430072,China 2 Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072,China 
supported by the National Natural Science Foundation of China (Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem. This paper studies its security level resisting against differential cryptanalysis. It is shown that the evolutionary cryptosystem possesses higher resistance than ...
关键词:information security CRYPTOLOGY evolutionary cryptosystem CRYPTANALYSIS differential cryptanalysis. 
Differential Attack on Five Rounds of the SC2000 Block Cipher被引量:1
《Journal of Computer Science & Technology》2011年第4期722-731,共10页吕继强 
supported by the French ANR Project SAPHIR Ⅱ
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128-bit user key is used. It is a CRYPTREC recommended e-government cipher in Japan. In...
关键词:CRYPTOLOGY block cipher SC2000 differential cryptanalysis 
检索报告 对象比较 聚类工具 使用帮助 返回顶部