CRYPTOGRAPHY

作品数:444被引量:750H指数:13
导出分析报告
相关作者:王建东任勇军夏荣钊周杭霞何利力更多>>
相关机构:南京航空航天大学南京信息工程大学中国计量学院浙江大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
WAS:improved white-box cryptographic algorithm over AS iteration
《Cybersecurity》2025年第1期142-152,共11页Yatao Yang Yuying Zhai Hui Dong Yanshuo Zhang 
supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...
关键词:White-box cryptography Block cipher Substitution permutation network structure Anti-key extraction Anti-code lifting 
ZKP Protocols for Usowan,Herugolf,and Five Cells
《Tsinghua Science and Technology》2024年第6期1651-1666,共16页Daiki Miyahara Léo Robert Pascal Lafourcade Takaaki Mizuki 
supported by the French ANR project ANR-18-CE39-0019(MobiS5);Other programs also fund to write this paper,namely the French government research program“Investissements d’Avenir”through the IDEX-ISITE initiative 16-IDEX-0001(CAP 20-25);the IMobS3 Laboratory of Excellence(No.ANR-10-LABX-16-01);Finally,the French ANR project DECRYPT(No.ANR-18-CE39-0007);SEVERITAS(No.ANR-20-CE39-0009)also subsidize this work;The first author was supported in part by Kayamori Foundation of Informational Science Advancement and JSPS KAKENHI(No.JP23H00479);The fourth author was supported in part by JSPS KAKENHI(Nos.JP21K11881 and JP23H00479).
A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a lin...
关键词:Zero-Knowledge Proof(ZKP)protocol playing cards card-based cryptography physical assumptions Usowan Herugolf FiveCells 
Research on privacy information retrieval model based on hybrid homomorphic encryption
《Cybersecurity》2024年第4期52-61,共10页Wei-tao Song Guang Zeng Wen-zheng Zhang Dian-hua Tang 
sponsored in part by the National Natural Science Foundation of China[Grant-Nos.61902428,6210071026,62202493].
The computational complexity of privacy information retrieval protocols is often linearly related to database size.When the database size is large,the efficiency of privacy information retrieval protocols is relativel...
关键词:CRYPTOGRAPHY Hybrid homomorphic encryption Privacy protection Private information retrieval 
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function
《密码学报(中英文)》2024年第6期1415-1436,共22页WANG Ya-Qi HUANG Fan DUAN Xiao-Lin HU Hong-Gang 
National Natural Science Foundation of China(62472397);Innovation Program for Quantum Science and Technology(2021ZD0302902)。
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P...
关键词:side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function 
Optimizing Energy Infrastructure with AI Technology: A Literature Review
《Open Journal of Applied Sciences》2024年第12期3516-3544,共29页Oyeniyi Richard Ajao 
The world’s energy industry is experiencing a significant transformation due to increased energy consumption, the rise in renewable energy usage, and the demand for sustainability. This review paper explores the pote...
关键词:Artificial Intelligence Energy Infrastructure Optimization Smart Grid Management Predictive Maintenance Renewable Energy Variability Machine Learning Cybersecurity in Energy Public-Private Partnerships Post-Quantum Cryptography Elliptic Curve Cryptography 
Lattice-based access authentication scheme for quantum communication networks
《Science China(Information Sciences)》2024年第12期307-313,共7页Min WANG Gui-Lu LONG 
supported by Young Elite Scientists Sponsorship Program by China Association for Science and Technology (Grant No.2022QNRC001)。
Access authentication scheme plays a foundational role in ensuring the security of communication networks. However, an access authentication scheme with high security and efficiency is still lacking in quantum communi...
关键词:quantum communication quantum network access authentication post-quantum cryptography network control center 
TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection
《Computers, Materials & Continua》2024年第11期2791-2818,共28页Isha Sood Varsha Sharm 
Ransomware has emerged as a critical cybersecurity threat,characterized by its ability to encrypt user data or lock devices,demanding ransom for their release.Traditional ransomware detection methods face limitations ...
关键词:Ransomware detection transfer learning unsupervised learning CO-CLUSTERING CYBERSECURITY machine learning lightweight cryptography post-quantum cryptography explainable AI TLERAD 
A New Random Sampling Method and Its Application in Improving Progressive BKZ Algorithm
《Journal of Systems Science & Complexity》2024年第5期2262-2292,共31页SUN Minghao WANG Shixiong CHEN Hao QU Longjiang 
supported by the National Natural Science Foundation of China under Grant Nos.62032009 and 62102440。
Random sampling algorithm was proposed firstly by Schnorr in 2003 to find short lattice vectors,as an alternative to enumeration.The follow-up developments in random sampling were mainly proposed by Fukase and Kashiwa...
关键词:Darmstadt’s lattice challenge LATTICE lattice reduction algorithm post-quantum cryptography random sampling 
Secure SSL/TLS Communication System Based on Quantum Keys
《ZTE Communications》2024年第3期106-115,共10页WANG Jigang LU Yuqian WEI Liping JIANG Xinzao ZHANG Han 
supported by ZTE IndustryUniversityInstitute Cooperation Funds under Grant No.HCCN20221029003.
Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ...
关键词:SSL/TLS protocols quantum key post-quantum cryptography 
When cryptography stops data science: strategies for resolving the conflicts between data scientists and cryptographers
《Data Science and Management》2024年第3期238-255,共18页Banaeian Far Saeed Imani Rad Azadeh 
The advent of the digital era and computer-based remote communications has significantly enhanced the applicability of various sciences over the past two decades,notably data science(DS)and cryptography(CG).Data scien...
关键词:Big data Data mining Homomorphic calculation Randomized data analytic Searchable encryption 
检索报告 对象比较 聚类工具 使用帮助 返回顶部