CRYPTOSYSTEMS

作品数:27被引量:39H指数:4
导出分析报告
相关领域:自动化与计算机技术电子电信更多>>
相关机构:上海交通大学更多>>
相关期刊:《Journal of Computer Science & Technology》《Journal of Electronics(China)》《计算机教育》《Science China Mathematics》更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
《Journal of Information Security》2024年第3期299-307,共9页Mugaruka Buduge Gulain Jeremie Ndikumagenge Buhendwa Nyenyezi Justin Bulonza Masumbuko Alexis Katho Seba Jacques 
In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any mod...
关键词:Comparative Study CRYPTOSYSTEMS Symmetric Encryption Asymmetric Encryption 
Chaos-Based Construction of LWEs in Lattice-Based Cryptosystems
《国际计算机前沿大会会议论文集》2023年第1期338-349,共12页Nina Cai Wuqiang Shen Fan Yang Hao Cheng Huiyi Tang Yihua Feng Jun Song Shanxiang Lyu 
This work was supported in part by the Open Research Fund of Joint Laboratory on Cyberspace Security,China Southern Power Grid(Grant No.CSS2022KF03);the Science and Technology Planning Project of Guangzhou,China(Grant No.202201010388).
In postquantum cryptography,the problem of learning with errors(LWE)has been widely used to create secure encryption algorithms.Nevertheless,the transmission of a large-dimensional public key matrix brings heavy overh...
关键词:postquantum cryptography LWE CHAOS 
Deep-learning-based cryptanalysis of two types of nonlinear optical cryptosystems
《Chinese Physics B》2022年第9期293-300,共8页Xiao-Gang Wang Hao-Yu Wei 
Project supported by the National Natural Science Foundation of China(Grant Nos.61975185 and 61575178);the Natural Science Foundation of Zhejiang Province,China(Grant No.LY19F030004);the Scientific Research and Development Fund of Zhejiang University of Science and Technology,China(Grant No.F701108L03).
The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mec...
关键词:optical encryption nonlinear optical cryptosystem deep learning phase retrieval algorithm 
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems被引量:4
《Journal of Systems Science & Complexity》2022年第1期373-412,共40页CHEN Yu-Ao GAO Xiao-Shan 
supported by the National Natural Science Foundation of China under Grant No.11688101and NKRDP 2018YFA0704705。
This paper presents a quantum algorithm to decide whether a Boolean equation system F has a solution and to compute one if F does have solutions with any given success probability.The runtime complexity of the algorit...
关键词:Block cipher AES Boolean equation solving condition number hash function SHA3/Keccak HHL algorithm MPKC polynomial system solving quantum algorithm stream cipher Trivum 
Formal Analysis and Verification of Oauth 2.0 Protocol Improved by Key Cryptosystems被引量:2
《Chinese Journal of Electronics》2017年第3期477-484,共8页XIAO Meihua CHENG Daolei LI Wei LI Ya'nan LIU Xinqian MEI Yingtian 
supported by the National Natural Science Foundation of China(No.61163005,No.61562026);the Natural Science Foundation of Jiangxi Province of China(No.20132BAB201033,No.20161BAB202063);the Science and Technology College in Jiangxi Province Ground Project(No.KJLD13038);the Co-Innovation Center of the Intelligent Management and Equipment for Orchard on the Hilly Land in South China,the Foreign Science and Technology Cooperation Project of Jiangxi Province(No.20151BDH80005);the Project of Soft Science Research Project of Jiangxi Province(No.20151BBA10042)
The reasons which take huge losses to enterprises and users are:Open authorization(OAuth)2.0protocol is excessively dependent on Hyper text transfer protocol over secure socket layer(HTTPS)to transmit data and ignores...
关键词:OAutb 2.0 protocol Model checking Public key system Private key signature Program enumeration. 
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
《China Communications》2016年第6期217-224,共8页Jianwei Jia Jinhui Liu Huanguo Zhang 
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
关键词:CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations 
Enhancements in the Security Level for Wireless Sensor Network
《Journal of Information Security》2015年第3期213-228,共16页Amr M. Kishk Nagy W. Messiha Nawal A. El-Fishawy Abd-Elrahman A. Alkafs Ahmed H. Madian 
The trade off between the energy consumption and the quality of the received image should be considered as a main point in the techniques design in Wireless Sensor Network (WSN). This paper analyzes the performance of...
关键词:CHAOTIC CRYPTOSYSTEMS Image ENCRYPTION Algorithms Encrypted AUDIO Samples MERGING Process Proposed AUDIO ENCRYPTION Algorithm 
FPGA based unified architecture for public key and private key cryptosystems被引量:1
《Frontiers of Computer Science》2013年第3期307-316,共10页Yi WANG Renfa LI 
This work was supported by National Natural Science Foundation of China (Grant No. 61173036) and the Fundamental Research Funds for Chinese Central Universities.
Recently, security in embedded system arises attentions because of modern electronic devices need cau- tiously either exchange or communicate with the sensitive data. Although security is classical research topic in...
关键词:AES RSA ECC signed-digit number FPGA cryptographic algorithms high radix arithmetic unit 
Algorithms for Super Long Integers in Cryptosystems被引量:1
《Chinese Journal of Electronics》2013年第2期258-262,共5页SU Shenghui LI Jian LUE Shuwang 
Super long integers which exceed the limit of numbers defined in existent computers are widely em- ployed in cryptosystems. In the paper, design 10 algo- rithms which address operands by the byte, and are used for the...
关键词:CRYPTOSYSTEM Super long integer Algo- rithm Time complexity Validation. 
Capability of evolutionary cryptosystems against differential cryptanalysis被引量:11
《Science China(Information Sciences)》2011年第10期1991-2000,共10页ZHANG HuanGuo 1,2 ,LI ChunLei 1,2 & TANG Ming 1,2 1 School of Computer,Wuhan University,Wuhan 430072,China 2 Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072,China 
supported by the National Natural Science Foundation of China (Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem. This paper studies its security level resisting against differential cryptanalysis. It is shown that the evolutionary cryptosystem possesses higher resistance than ...
关键词:information security CRYPTOLOGY evolutionary cryptosystem CRYPTANALYSIS differential cryptanalysis. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部