supported by the State Key Program of National Natural Science Foundation of China under grant 61332019;the Major State Basic Research Development Program of China(973 Program)under grant 2014CB340601;the National Science Foundation of China under grant 61202386 and grant 61402339;the National Cryptography Development Fund of China under grant MMJJ201701304。
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant...
supported by National Basic Research Program of China(973 Program)(Grant No.2013CB834205);National Natural Science Foundation of China(Grant No.61373142)
SM3 is the Chinese hash standard and is standardized in GB/T 32905-2016 . As a hash function, it must fulfill three security requirements, colli-sion resistance, preimage resistance, and second preimage resistance. Du...
supported by the State Key Program of National Natural Science of China(Grant Nos. 61332019);the National Natural Science Foundation of China (61572303);National Key Research and Development Program of China ( 2017YFB0802003 , 2017YFB0802004);National Cryptography Development Fund during the 13th Five-year Plan Period (MMJJ20170216);the Foundation of State Key Laboratory of Information Security (2017-MS-03);the Fundamental Research Funds for the Central Universities(GK201702004,GK201603084);Major State Basic Research Development Program of China (973 Program) (No.2014CB340600);National High-tech R&D Program of China(2015AA016002, 2015AA016004);Natural Science Foundation of He Bei Province (No. F2017201199);Science and technology research project of Hebei higher education (No. QN2017020)
A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryp...
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix...
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
Supported by the National Natural Science Foundation of China(61303212,61170080,61202386);the State Key Program of National Natural Science of China(61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(91018008);Major State Basic Research Development Program of China(973 Program)(2014CB340600);the Natural Science Foundation of Hubei Province(2011CDB453,2014CFB440)
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ...
This work is supported by the National Basic Research Program of China (973 Program) (No.2011CBC302400), the National Natural Science Foundation of China (No.60970152), and the Young Teacher's Fund Project of Huaiyin Normal University (No.07HSQN020).
Most of implementations of the cryptana- lyric time-memory trade-off attacks such as Hellman's orig- inal method, Rivest's distinguished points cracking and Oechslin's rainbow attack are also considered as an ex- h...