CRYPTANALYSIS

作品数:157被引量:262H指数:8
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:王美琴更多>>
相关机构:电子科技大学河北工业大学山东大学清华大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划北京市自然科学基金国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 基金=国家重点基础研究发展计划(973Program)x
条 记 录,以下是1-7
视图:
排序:
Cryptanalysis and improvement of several quantum private comparison protocols被引量:1
《Communications in Theoretical Physics》2020年第8期57-62,共6页Zhao-Xu Ji Pei-Ru Fan Huan-Guo Zhang Hou-Zhen Wang 
supported by the State Key Program of National Natural Science Foundation of China under grant 61332019;the Major State Basic Research Development Program of China(973 Program)under grant 2014CB340601;the National Science Foundation of China under grant 61202386 and grant 61402339;the National Cryptography Development Fund of China under grant MMJJ201701304。
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant...
关键词:quantum information security quantum cryptography quantum private comparison information leakage problem passive attack 
Improved cryptanalysis of step-reduced SM3被引量:1
《Science China(Information Sciences)》2018年第3期222-223,共2页Yanzhao SHEN Dongxia BAI Hongbo YU 
supported by National Basic Research Program of China(973 Program)(Grant No.2013CB834205);National Natural Science Foundation of China(Grant No.61373142)
SM3 is the Chinese hash standard and is standardized in GB/T 32905-2016 . As a hash function, it must fulfill three security requirements, colli-sion resistance, preimage resistance, and second preimage resistance. Du...
关键词:CF In SM Improved cryptanalysis of step-reduced SM3 
Cryptanalysis of a Cryptosystem with Non- Commutative Platform Groups被引量:1
《China Communications》2018年第2期67-73,共7页Jinhui Liu Jianwei Jia Huanguo Zhang Rongwei Yu Yong Yu Wangqing Wu 
supported by the State Key Program of National Natural Science of China(Grant Nos. 61332019);the National Natural Science Foundation of China (61572303);National Key Research and Development Program of China ( 2017YFB0802003 , 2017YFB0802004);National Cryptography Development Fund during the 13th Five-year Plan Period (MMJJ20170216);the Foundation of State Key Laboratory of Information Security (2017-MS-03);the Fundamental Research Funds for the Central Universities(GK201702004,GK201603084);Major State Basic Research Development Program of China (973 Program) (No.2014CB340600);National High-tech R&D Program of China(2015AA016002, 2015AA016004);Natural Science Foundation of He Bei Province (No. F2017201199);Science and technology research project of Hebei higher education (No. QN2017020)
A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryp...
关键词:CRYPTANALYSIS post-quantum com-putational cryptography conjugator searchproblem computational complexity 
Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
《Chinese Journal of Electronics》2017年第5期947-951,共5页JIA Jianwei LIU Jinhui ZHANG Huanguo 
supported by the National Natural Science Foundation of China(No.61303212,No.61170080,No.61202386);the State Key Program of National Natural Science of China(No.61332019,No.U1135004);the Major Research Plan of the National Natural Science Foundation of China(No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(No.2011CDB453,No.2014CFB440)
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix...
关键词:CRYPTOGRAPHY Key exchange protocol CRYPTANALYSIS Discrete logarithm problem Linear equations 
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
《China Communications》2016年第6期217-224,共8页Jianwei Jia Jinhui Liu Huanguo Zhang 
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
关键词:CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations 
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
《Wuhan University Journal of Natural Sciences》2016年第3期209-213,共5页LIU Jinhui ZHANG Huanguo JIA Jianwei 
Supported by the National Natural Science Foundation of China(61303212,61170080,61202386);the State Key Program of National Natural Science of China(61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(91018008);Major State Basic Research Development Program of China(973 Program)(2014CB340600);the Natural Science Foundation of Hubei Province(2011CDB453,2014CFB440)
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ...
关键词:CRYPTOGRAPHY post-quantum computational cryptography key exchange protocol CRYPTANALYSIS matrix decomposition 
Making a Higher Hit Ratio Cryptanalytic Time-Memory Trade-Off Attack on Passwords被引量:1
《Chinese Journal of Electronics》2013年第4期671-676,共6页ZOU JingI LIN Dongdai HAO Chunhui LI Zhenqi WANG Wenhao LU Yao 
This work is supported by the National Basic Research Program of China (973 Program) (No.2011CBC302400), the National Natural Science Foundation of China (No.60970152), and the Young Teacher's Fund Project of Huaiyin Normal University (No.07HSQN020).
Most of implementations of the cryptana- lyric time-memory trade-off attacks such as Hellman's orig- inal method, Rivest's distinguished points cracking and Oechslin's rainbow attack are also considered as an ex- h...
关键词:Time-memory trade-off CRYPTANALYSIS High hit ratio. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部