相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Chinese Journal of Electronics》《Advances in Internet of Things》《Science China(Information Sciences)》更多>>
Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear...
This work is supported by the Scientific Research Project(BAP)2020FEBE009,Pamukkale University,Denizli,Turkey.
The Advanced Encryption Standard(AES)is the most widely used symmetric cipher today.AES has an important place in cryptology.Finite field,also known as Galois Fields,are cornerstones for understanding any cryptography...
Supported by Nanhu Scholars Program for Young Scholars of Xinyang Normal University。
Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplicative group Z_(n)^(*),which can be used to factor the integer n by computing gcd(a^(r/2)±1,n),and henc...
Supported by the National Natural Science Foundation of China(61303212,61202386);the State Key Program of National Natural Science of China(61332019);the Major Research Plan of the National Natural Science Foundation of China(91018008,SKLSE-2015-A-02)
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciph...
supported by the National Natural Science Foundation of China(Grant Nos.61272440,61073149);Research Fund for the Doctoral Program of Higher Education of China(Grant No.20090073110027);State Key Laboratory of ASIC&System(Grant No.11KF0020);Key Lab of Information Network Security,Ministry of Public Security(Grant No.C11603);Scholarship Award for Excellent Doctoral Student granted by Ministry of Education
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption scheme. In our scheme,new users can join dynamically without modification of other users' decryption keys. Either the ciphertext or the d...
supported by the National Natural Science Foundation of China (61370089);the Fundamental Research Funds for the Central Universities (2012HGBZ0622)
Complexity measures for multisequences over finite fields, such as the joint linear complexity and the k-error joint linear complexity, play an important role in cryptology. In this paper we study a fast algorithm, pr...
supported by the National Natural Science Foundation of China(Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t...
supported by the National Natural Science Foundation of China (Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem. This paper studies its security level resisting against differential cryptanalysis. It is shown that the evolutionary cryptosystem possesses higher resistance than ...
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128-bit user key is used. It is a CRYPTREC recommended e-government cipher in Japan. In...
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenienc...