相关期刊:《International Journal of Communications, Network and System Sciences》《Frontiers of Information Technology & Electronic Engineering》《国际计算机前沿大会会议论文集》《Chinese Journal of Electronics》更多>>
The National Natural Science Foundation of China(No.61572521);Engineering University of PAP Innovation Team Science Foundation(No.KYTD201805);Natural Science Basic Research Plan in Shaanxi Province of China(2021JM252).
Encrypted communication using artificial intelligence is a new challenging research direction.GoogleBrain first proposed the generation of encrypted communication based on Generative Adversarial Networks,resulting in ...
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d...
Project supported by the Major Program of the Ministry of Industry and Information Technology of China(No.2017ZX01030301);the Beijing Natural Science Foundation of China(No.4162053)
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec...
supported by China Scholarship Council under Grant No.201506965088
In this paper, we present one method to attack on the GMR-2 algorithm used in satellite phone under the chosen-plaintexts. First using the relationship of the rows of the two s-boxes and outputs of the F coordinate, w...
supported by the National Natural Science Foundation of China(No.61562035);the Natural Science Foundation of Jiangxi Province(No.20161BAB202058);the Science and Technology Project of Education Department of Jiangxi Province,China(No.GJJ14333)
A new symmetric key image encryption scheme based on hyper-chaotic Lorenz system is proposed.The encryption process and the decryption process are identical in the proposed scheme.They both include two diffusion opera...
In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows an...
Acknowledgements This work was supported by the National Natural Science Foundation of China under Grants No. 61073187 and No. 61161006; the Hunan Provincial Natural Science Foundation of China under Grant No. 10JJ6093 and the Hunan Provincial Science and Technology Program under Ccant No. 2010GK2003.
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process...
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function invol...
In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integers. Also the proper selection of cryptographic system para...
This work is supported by the National Natural Science Foundation of China (No. 69874038), the National High-Tech Research and Development Plan of China (No. 2001AA115300) and the Natural Science Foundation of Liaoning Province of China (No. 20031018).