In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any mod...
This work was supported in part by the Open Research Fund of Joint Laboratory on Cyberspace Security,China Southern Power Grid(Grant No.CSS2022KF03);the Science and Technology Planning Project of Guangzhou,China(Grant No.202201010388).
In postquantum cryptography,the problem of learning with errors(LWE)has been widely used to create secure encryption algorithms.Nevertheless,the transmission of a large-dimensional public key matrix brings heavy overh...
Project supported by the National Natural Science Foundation of China(Grant Nos.61975185 and 61575178);the Natural Science Foundation of Zhejiang Province,China(Grant No.LY19F030004);the Scientific Research and Development Fund of Zhejiang University of Science and Technology,China(Grant No.F701108L03).
The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mec...
supported by the National Natural Science Foundation of China under Grant No.11688101and NKRDP 2018YFA0704705。
This paper presents a quantum algorithm to decide whether a Boolean equation system F has a solution and to compute one if F does have solutions with any given success probability.The runtime complexity of the algorit...
supported by the National Natural Science Foundation of China(No.61163005,No.61562026);the Natural Science Foundation of Jiangxi Province of China(No.20132BAB201033,No.20161BAB202063);the Science and Technology College in Jiangxi Province Ground Project(No.KJLD13038);the Co-Innovation Center of the Intelligent Management and Equipment for Orchard on the Hilly Land in South China,the Foreign Science and Technology Cooperation Project of Jiangxi Province(No.20151BDH80005);the Project of Soft Science Research Project of Jiangxi Province(No.20151BBA10042)
The reasons which take huge losses to enterprises and users are:Open authorization(OAuth)2.0protocol is excessively dependent on Hyper text transfer protocol over secure socket layer(HTTPS)to transmit data and ignores...
supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386);the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004);the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008);Major State Basic Research Development Program of China(973 Program)(No.2014CB340600);the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...
The trade off between the energy consumption and the quality of the received image should be considered as a main point in the techniques design in Wireless Sensor Network (WSN). This paper analyzes the performance of...
This work was supported by National Natural Science Foundation of China (Grant No. 61173036) and the Fundamental Research Funds for Chinese Central Universities.
Recently, security in embedded system arises attentions because of modern electronic devices need cau- tiously either exchange or communicate with the sensitive data. Although security is classical research topic in...
Super long integers which exceed the limit of numbers defined in existent computers are widely em- ployed in cryptosystems. In the paper, design 10 algo- rithms which address operands by the byte, and are used for the...
supported by the National Natural Science Foundation of China (Grant Nos.69973034,90104005,60373087,60673071,60970115,60970116,91018008,60970006,61003267)
The evolutionary cryptosystem is a new cryptosystem. This paper studies its security level resisting against differential cryptanalysis. It is shown that the evolutionary cryptosystem possesses higher resistance than ...