supported by the National Natural Science Foundation of China under Grant No.61572490;the National Key Research and Development Project under Grant No.2018YFA0704705;the National Center for Mathematics and Interdisciplinary Sciences,CAS。
As a candidate of the standard of post-quantum cryptography for NIST,Liu,et al.submitted a new public-key encryption scheme Compact-LWE,whose structure is similar to LWE,but with different distribution of errors.They ...
supported by National Natural Science Foundation of China (Grant Nos. 61772129, 61672347);National Cryptography Development Fund (Grant Nos. MMJJ20180101, MMJJ20180202);Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201703);Shanghai Sailing Program (Grant No. 17YF1405500);Graduate Student Innovation Fund of Donghua University (Grant No. GSIF-DH-M-2019013)。
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and t...
financial supports from the National Natural Science Foundation of China(NSFC)(62061136005,61705141,61805152,61875129,61701321);Sino-German Research Collaboration Group(GZ 1391);the Mobility program(M-0044)sponsored by the Sino-German Center;Chinese Academy of Sciences(QYZDB-SSW-JSC002);Science and Technology Innovation Commission of Shenzhen(JCYJ20170817095047279)。
Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical e...
This work is supported by the National Natural Science Foundation of China (No.61070172), the National High Technology Research and Development Program of China (863 Program) (No.2006AA01Z416) and the National Basic Research Program of China (No.2007CB311201).
This paper analyzes a new multivariate public key encryption scheme which we name as PTH+. It is an improved version of the TH scheme by the internal perturbation and plus methods. The inventors of PTH+ claimed that...