CRYPTOGRAPHIC

作品数:98被引量:107H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:崔国华郑明辉王滨李峥马智更多>>
相关机构:解放军信息工程大学华中科技大学中国人民解放军信息工程大学淮北矿业集团更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划中国博士后科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
RCCA-SM9:securing SM9 on corrupted machines
《Science China(Information Sciences)》2024年第11期102-116,共15页Rongmao CHEN Jinrong CHEN Xinyi HUANG Yi WANG 
supported by National Natural Science Foundation of China(Grant Nos.62122092,62032005)。
The SM9 identity-based encryption(IBE)scheme is a cryptographic standard used in China,and has been incorporated into the ISO/IEC standard in 2021.This work primarily proposes a countermeasure to secure the SM9 IBE sc...
关键词:SM9 subversion resilience subversion attack cryptographic reverse firewall RCCA 
Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model
《Chinese Physics B》2024年第4期418-433,共16页周新卫 蒋东华 Jean De Dieu Nkapkop Musheer Ahmad Jules Tagne Fossi Nestor Tsafack 吴建华 
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
关键词:cellular neural network MEMRISTOR hardware circuit compressive sensing privacy data protection 
Data Secure Storage Mechanism for IIoT Based on Blockchain被引量:2
《Computers, Materials & Continua》2024年第3期4029-4048,共20页Jin Wang Guoshu Huang R.Simon Sherratt Ding Huang Jia Ni 
supported by China’s National Natural Science Foundation(Nos.62072249,62072056);This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029).
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
关键词:Blockchain IIoT data storage cryptographic commitment 
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
《Computers, Materials & Continua》2024年第3期4417-4452,共36页Fauziyah Zhaoshun Wang Mujahid Tabassum 
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...
关键词:CRYPTOGRAPHIC SECURITY privacy preservation DECRYPTION INTEGRITY 
Joint Authentication Public Network Cryptographic Key Distribution Protocol Based on Single Exposure Compressive Ghost Imaging
《Chinese Physics Letters》2024年第2期47-56,共10页俞文凯 王硕飞 商克谦 
supported by the Beijing Natural Science Foundation(Grant No.4222016).
In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memo...
关键词:GHOST GHOST AUTHENTICATION 
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
《Computers, Materials & Continua》2024年第2期2023-2045,共23页Nader Abdel Karim Osama A.Khashan Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...
关键词:Cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm 
A Flexible Architecture for Cryptographic Applications: ECC and PRESENT
《Computers, Materials & Continua》2023年第7期1009-1025,共17页Muhammad Rashid Omar S.Sonbul Muhammad Arif Furqan Aziz Qureshi Saud.S.Alotaibi Mohammad H.Sinky 
The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4320020DSR01).
This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography(ECC)and PRESENT for cryptographic applications.The features of the proposed work are(i)computation of only the point multiplic...
关键词:Flexible UNIFIED design ECC PRESENT FPGA 
Classification Model for IDS Using Auto Cryptographic Denoising Technique
《Computer Systems Science & Engineering》2023年第4期671-685,共15页N.Karthikeyan P.Sivaprakash S.Karthik 
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization algorithms.These classifiers,on the other hand,do not work e...
关键词:Auto cryptographic denoising(ACD) classifier intrusion detection system(IDS) OPTIMIZER performance measures 
WBZUC:novel white-box ZUC-128 stream cipher被引量:1
《The Journal of China Universities of Posts and Telecommunications》2023年第2期96-106,共11页Yang Yatao Zhang Ruoqing Dong hui Ma Yingjie Zhang Xiaowei 
supported by the Beijing Natural Science Foundation(4232034);the Fundamental Research Funds for the Central Universities(328202222);the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...
关键词:Zu Chongzhi-128(ZUC-128)algorithm white-box cryptography cryptographic implementation lookup table secure communication 
Data Security Storage Mechanism Based on Blockchain Network
《Computers, Materials & Continua》2023年第3期4933-4950,共18页Jin Wang WeiOu Wenhai Wang RSimon Sherratt Yongjun Ren Xiaofeng Yu 
This work is supported by the Fundamental Research Funds for the central Universities(Zhejiang University NGICS Platform),Xiaofeng Yu receives the grant and the URLs to sponsors’websites are https://www.zju.edu.cn/.And the work are supported by China’s National Natural Science Foundation(No.62072249,62072056);JinWang and Yongjun Ren receive the grant and the URLs to sponsors’websites are https://www.nsfc.gov.cn/.This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029);Jin Wang receives the grant and the URLs to sponsors’websites are http://kjt.hunan.gov.cn/.
With the rapid development of information technology,the development of blockchain technology has also been deeply impacted.When performing block verification in the blockchain network,if all transactions are verified...
关键词:Blockchain cryptographic commitment smart contract data storage 
检索报告 对象比较 聚类工具 使用帮助 返回顶部