咨询与建议

限定检索结果

文献类型

  • 18 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 21 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 11 篇 网络空间安全
    • 8 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 1 篇 软件工程
  • 4 篇 理学
    • 4 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 5 篇 information secu...
  • 4 篇 hash function
  • 3 篇 trusted computin...
  • 3 篇 trusted computin...
  • 3 篇 cryptology
  • 2 篇 evolutionary cry...
  • 2 篇 cryptography
  • 2 篇 differential cry...
  • 2 篇 cryptanalysis
  • 2 篇 mq problem
  • 1 篇 evolutionary cry...
  • 1 篇 pon
  • 1 篇 trusted environm...
  • 1 篇 系统行为建模
  • 1 篇 trust degree
  • 1 篇 pda终端
  • 1 篇 智能电网
  • 1 篇 trustworthiness ...
  • 1 篇 software behavio...
  • 1 篇 生存环境建模

机构

  • 4 篇 school of comput...
  • 3 篇 武汉大学
  • 2 篇 the key laborato...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 beijing universi...
  • 1 篇 国网湖北省电力有...
  • 1 篇 key lab of speci...
  • 1 篇 the key laborato...
  • 1 篇 school of comput...
  • 1 篇 school of scienc...
  • 1 篇 college of mathe...
  • 1 篇 key laboratory o...
  • 1 篇 tongji branch na...
  • 1 篇 huawei technolog...
  • 1 篇 key laboratory o...
  • 1 篇 空天信息安全及可...
  • 1 篇 key loboratory o...
  • 1 篇 key laboratory o...

作者

  • 2 篇 china
  • 1 篇 shen changxiang1...
  • 1 篇 郭曦
  • 1 篇 zhang huanguo 1 ...
  • 1 篇 3. college of in...
  • 1 篇 杨墨
  • 1 篇 2 key laboratory...
  • 1 篇 zhengzhou 450001...
  • 1 篇 wang bangju1 2 w...
  • 1 篇 2 key laboratory...
  • 1 篇 zhao bo~(1 2) yu...
  • 1 篇 阎军智
  • 1 篇 2.school of comp...
  • 1 篇 zhang huanguo1 2...
  • 1 篇 3school of compu...
  • 1 篇 刘宏月
  • 1 篇 2.key laboratory...
  • 1 篇 2key laboratory ...
  • 1 篇 wang wei1 2 3 & ...
  • 1 篇 刘喆

语言

  • 17 篇 英文
  • 4 篇 中文
检索条件"作者=2.key laboratory of aerospace information security and Trust computing,ministry of education,wuhan {2.,Hubei,china"
21 条 记 录,以下是1-10 订阅
排序:
Evolutionary cryptography against multidimensional linear cryptanalysis
收藏 引用
Science china(information Sciences) 2011年 第12期54卷 2585-2597页
作者: ZHANG HuanGuo 1,2., LI ChunLei 1,2.& TANG Ming 1,2.1 School of Computer, wuhan University, wuhan 430079, {2. 2.key laboratory of aerospace information security and trusted computing of ministry of education of {2., wuhan University, wuhan 430079, {2. School of Computer Wuhan University Wuhan China key laboratory of {2. information security and trusted computing of ministry of education of china Wuhan University Wuhan China
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Capability of evolutionary cryptosystems against differential cryptanalysis
收藏 引用
Science china(information Sciences) 2011年 第10期54卷 1991-2000页
作者: ZHANG HuanGuo 1,2.,LI ChunLei 1,2.& TANG Ming 1,2.1 School of Computer,wuhan University,wuhan 430072.{2. 2.key laboratory of aerospace information security and trusted computing of ministry of education,wuhan University,wuhan 430072.{2. School of Computer Wuhan University Wuhan China key laboratory of {2. information security and trusted computing of ministry of education Wuhan University Wuhan China
The evolutionary cryptosystem is a new *** paper studies its security level resisting against differential *** is shown that the evolutionary cryptosystem possesses higher resistance than its initial fixed cryptosyste... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A trusted Environment Construction Method for security-Sensitive Software
收藏 引用
wuhan University Journal of Natural Sciences 2011年 第5期16卷 383-390页
作者: LI Jing1,2.ZHANG Huanguo1,2.ZHAO Bo1,2.FANG Lingling1,2.1.School of Computer,wuhan University,wuhan 430072.{2.,china 2.key laboratory of aerospace information security and trust computing,ministry of education,wuhan 430072.{2.,china School of Computer Wuhan University Wuhan Hubei China key laboratory of {2. information security and trust computing Ministry of Education Wuhan Hubei China
This paper presents a trusted-environment construction method based on the underlying hardware. This method aims at protecting the security-sensitive software in the aspects of software loading, running, and storing i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Extended multivariate public key cryptosystems with secure encryption function
收藏 引用
Science china(information Sciences) 2011年 第6期54卷 1161-1171页
作者: WANG HouZhen 1,2., ZHANG HuanGuo 1,2., WANG ZhangYi 1,2.& TANG Ming 1,2.1 The key laboratory of {2. information security and trusted computing, ministry of education, School of Computer, wuhan University, wuhan 430079, china 2.State key laboratory of Software Engineering, wuhan University, wuhan 430072. china The key laboratory of {2. information security and trusted computing Ministry of Education School of Computer Wuhan University Wuhan China State key laboratory of Software Engineering Wuhan University Wuhan China
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Fast Pseudorandom Number Generator with BLAKE Hash Function
收藏 引用
wuhan University Journal of Natural Sciences 2010年 第5期15卷 393-397页
作者: WANG Houzhen1,2.ZHANG Huanguo1,2.1.key laboratory of {2. information security and trusted computing of ministry of education,wuhan University,wuhan 430072.hubei,china 2.School of Computer,wuhan University,wuhan 430072.hubei,china key laboratory of {2. information security and trusted computing of ministry of education Wuhan University Wuhan Hubei China School of Computer Wuhan University Wuhan Hubei China
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test *** th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Novel encryption model for multimedia data
收藏 引用
Journal of Systems Engineering and Electronics 2009年 第5期20卷 1081-1085页
作者: Ye Dengpan~(1,2. & Lian Shiguo~3 1.The key laboratory of {2. information security and trust computing,ministry of education,wuhan 430072.P.R.china 2.School of Computer Science,wuhan Univ.,wuhan 430072.P.R.china 3.France Telecom R&D Beijing,Beijing 100080,P.R.china The key laboratory of {2. information security and trust computing Ministry of Education Wuhan 430072 P. R. China School of Computer Science Wuhan Univ. Wuhan 430072 P. R. China France Telecom R&D Beijing Beijing 100080 P. R. China
A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. An... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design theory and method of multivariate hash function
收藏 引用
Science china(information Sciences) 2010年 第10期53卷 1977-1987页
作者: WANG HouZhen 1,2., ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The key laboratory of {2. information security and trusted computing, ministry of education, School of Computer, wuhan University, wuhan 430072. china 2.key laboratory of Mathematics Mechanization, Beijing 100080, china The key laboratory of {2. information security and trusted computing Ministry of Education School of Computer Wuhan University Wuhan China key laboratory of Mathematics Mechanization Beijing China
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new perturbation algorithm and enhancing security of SFLASH signature scheme
收藏 引用
Science china(information Sciences) 2010年 第4期53卷 760-768页
作者: WANG HouZhen1,2. ZHANG HuanGuo1,2., GUAN HaiMing3 & HAN HaiQing1,2.1The key laboratory of {2. information security and trusted computing, ministry of education, wuhan University, wuhan 430072. china 2.chool of Computer, wuhan University, wuhan 430079, china 3Chinese Electronic Equipment System Corporation, Beijing 100039, china The key laboratory of {2. information security and trusted computing Ministry of Education Wuhan University Wuhan China School of Computer Wuhan University Wuhan China Chinese Electronic Equipment System Corporation Beijing China
This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPKCs). Eur... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on theory and key technology of trusted {2. platform security testing and evaluation
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 434-453页
作者: ZHANG HuanGuo1,2. YAN Fei1,2. FU JianMing1,2. XU MingDi1,2. YANG Yang1,2. HE Fan1,2.& ZHAN Jing1,2.1School of Computer, wuhan University, wuhan 430072. {2. 2.3} laboratory of aerospace information security and trusted computing, ministry of education, wuhan 430072. {2. School of Computer Wuhan University Wuhan China key laboratory of {2. information security and trusted computing Ministry of Education Wuhan China
trusted computing has become a new trend in the area of international {2. security, and the products of trusted computing platform begin to be used in application. Users will not use the products of informatio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science china(information Sciences) 2012年 第4期55卷 911-920页
作者: WANG Chao 1,ZHANG HuanGuo 2.3 & LIU LiLi 4 1 key Lab of Specialty Fiber Optics and Optical Access Network,ministry of education,Shanghai University,Shanghai 2.0072.{2. 2.Computer School of wuhan University,wuhan 430072.{2. 3 key laboratory of aerospace information security and trusted {12. ministry of education,wuhan 430072.{2. 4 Huawei Technologies CO.LTD.,Shanghai 2.12.6,{2. key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Shanghai China Computer School of wuhan University Wuhan China key laboratory of {2. information security and trusted computing ministry of education Wuhan China Huawei Technologies CO. LTD. Shanghai China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher {2. elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论