咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 10 篇 网络空间安全
    • 8 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 4 篇 理学
    • 4 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 5 篇 information secu...
  • 4 篇 hash function
  • 3 篇 trusted computin...
  • 3 篇 trusted computin...
  • 3 篇 cryptology
  • 2 篇 evolutionary cry...
  • 2 篇 cryptography
  • 2 篇 differential cry...
  • 2 篇 cryptanalysis
  • 2 篇 mq problem
  • 1 篇 evolutionary cry...
  • 1 篇 pon
  • 1 篇 trusted environm...
  • 1 篇 系统行为建模
  • 1 篇 trust degree
  • 1 篇 pda终端
  • 1 篇 智能电网
  • 1 篇 trustworthiness ...
  • 1 篇 software behavio...
  • 1 篇 生存环境建模

机构

  • 4 篇 school of comput...
  • 3 篇 武汉大学
  • 2 篇 the key laborato...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 1 篇 beijing universi...
  • 1 篇 国网湖北省电力有...
  • 1 篇 key lab of speci...
  • 1 篇 school of comput...
  • 1 篇 school of scienc...
  • 1 篇 college of mathe...
  • 1 篇 key laboratory o...
  • 1 篇 huawei technolog...
  • 1 篇 key laboratory o...
  • 1 篇 空天信息安全及可...
  • 1 篇 key laboratory o...
  • 1 篇 key laboratory o...
  • 1 篇 key laboratory o...
  • 1 篇 chinese electron...
  • 1 篇 school of comput...

作者

  • 2 篇 china
  • 1 篇 shen changxiang1...
  • 1 篇 郭曦
  • 1 篇 zhang huanguo 1 ...
  • 1 篇 3. college of in...
  • 1 篇 杨墨
  • 1 篇 2 key laboratory...
  • 1 篇 zhengzhou 450001...
  • 1 篇 wang bangju1 2 w...
  • 1 篇 2 key laboratory...
  • 1 篇 zhao bo~(1 2) yu...
  • 1 篇 zhang huanguo1 2...
  • 1 篇 3school of compu...
  • 1 篇 2.key laboratory...
  • 1 篇 2key laboratory ...
  • 1 篇 刘喆
  • 1 篇 li jing1 2 zhang...
  • 1 篇 3 key laboratory...
  • 1 篇 weicheng xiong s...
  • 1 篇 2 state key labo...

语言

  • 15 篇 英文
  • 3 篇 中文
检索条件"作者=2.key laboratory of aerospace information security and trusted computing of ministry of education of {2., wuhan University, wuhan 430079, {2."
18 条 记 录,以下是1-10 订阅
排序:
Evolutionary cryptography against multidimensional linear cryptanalysis
收藏 引用
Science China(information Sciences) 2011年 第12期54卷 2585-2597页
作者: ZHANG HuanGuo 1,2., LI ChunLei 1,2.& TANG Ming 1,2.1 School of Computer, wuhan university, wuhan 430079, China {2. laboratory of aerospace information security and trusted computing of ministry of education of China, wuhan university, wuhan 430079, China School of Computer Wuhan University Wuhan China key laboratory of {2. {2. security and trusted computing of ministry of education of China Wuhan University Wuhan China
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Capability of evolutionary cryptosystems against differential cryptanalysis
收藏 引用
Science China(information Sciences) 2011年 第10期54卷 1991-2000页
作者: ZHANG HuanGuo 1,2.,LI ChunLei 1,2.& TANG Ming 1,2.1 School of Computer,wuhan university,wuhan 430072.China 2.key laboratory of aerospace information security and trusted computing of ministry of education,wuhan university,wuhan 430072.China School of Computer Wuhan University Wuhan China key laboratory of {2. {2. security and trusted computing of ministry of education Wuhan University Wuhan China
The evolutionary cryptosystem is a new *** paper studies its security level resisting against differential *** is shown that the evolutionary cryptosystem possesses higher resistance than its initial fixed cryptosyste... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Extended multivariate public key cryptosystems with secure encryption function
收藏 引用
Science China(information Sciences) 2011年 第6期54卷 1161-1171页
作者: WANG HouZhen 1,2., ZHANG HuanGuo 1,2., WANG ZhangYi 1,2.& TANG Ming 1,2.1 The key laboratory of {2. {2. security and trusted computing, ministry of education, School of Computer, wuhan university, wuhan 430079, China 2.State key laboratory of Software Engineering, wuhan university, wuhan 430072. China The key laboratory of {2. {2. security and trusted computing Ministry of Education School of Computer Wuhan University Wuhan China State key laboratory of Software Engineering Wuhan University Wuhan China
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new perturbation algorithm and enhancing security of SFLASH signature scheme
收藏 引用
Science China(information Sciences) 2010年 第4期53卷 760-768页
作者: WANG HouZhen1,2. ZHANG HuanGuo1,2., GUAN HaiMing3 & HAN HaiQing1,2.1The key laboratory of {2. {2. security and trusted computing, ministry of education, wuhan university, wuhan 430072. China 2.chool of Computer, wuhan university,{12., China 3Chinese Electronic Equipment System Corporation, Beijing 100039, China The key laboratory of {2. {2. security and trusted computing Ministry of Education Wuhan University Wuhan China School of Computer Wuhan University Wuhan China Chinese Electronic Equipment System Corporation Beijing China
This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPKCs). Eur... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on theory and key technology of trusted {2. platform {2. testing and evaluation
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 434-453页
作者: ZHANG HuanGuo1,2. YAN Fei1,2. FU JianMing1,2. XU MingDi1,2. YANG Yang1,2. HE Fan1,2.& ZHAN Jing1,2.1School of Computer, wuhan university, wuhan 430072. China 2.2. {2. of aerospace information security and trusted computing, ministry of education, wuhan 430072. China School of Computer Wuhan University Wuhan China key laboratory of {2. {2. security and trusted computing Ministry of Education Wuhan China
trusted computing has become a new trend in the area of international{2. security, and the products of trusted computing platform begin to be used in application. Users will not use the products of informatio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Fast Pseudorandom Number Generator with BLAKE Hash Function
收藏 引用
wuhan university Journal of Natural Sciences 2010年 第5期15卷 393-397页
作者: WANG Houzhen1,2.ZHANG Huanguo1,2.1.key laboratory of {2. {2. security and trusted computing of ministry of education,wuhan university,wuhan 430072.Hubei,China 2.School of Computer,wuhan university,wuhan 430072.Hubei,China key laboratory of {2. {2. security and trusted computing of ministry of education Wuhan University Wuhan Hubei China School of Computer Wuhan University Wuhan Hubei China
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test *** th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design theory and method of multivariate hash function
收藏 引用
Science China(information Sciences) 2010年 第10期53卷 1977-1987页
作者: WANG HouZhen 1,2., ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The key laboratory of {2. {2. security and trusted computing, ministry of education, School of Computer, wuhan university, wuhan 430072. China 2.key laboratory of Mathematics Mechanization, Beijing 100080, China The key laboratory of {2. {2. security and trusted computing Ministry of Education School of Computer Wuhan University Wuhan China key laboratory of Mathematics Mechanization Beijing China
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science China(information Sciences) 2012年 第4期55卷 911-920页
作者: WANG Chao 1,ZHANG HuanGuo 2.3 & LIU LiLi 4 1 key Lab of Specialty Fiber Optics and Optical Access Network,ministry of {2.,Shanghai {2.,Shanghai 2.0072.China 2.Computer School of wuhan university,wuhan 430072.China 3 key laboratory of aerospace information security and trusted {12. ministry of {2.,wuhan 430072.China 4 Huawei Technologies CO.LTD.,Shanghai 2.12.6,China key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Shanghai China Computer School of wuhan university Wuhan China key laboratory of {2. {2. security and trusted computing ministry of education Wuhan China Huawei Technologies CO. LTD. Shanghai China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher{2. elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A trusted Environment Construction Method for security-Sensitive Software
收藏 引用
wuhan university Journal of Natural Sciences 2011年 第5期16卷 383-390页
作者: LI Jing1,2.ZHANG Huanguo1,2.ZHAO Bo1,2.FANG Lingling1,2.1.School of Computer,wuhan university,wuhan 430072.Hubei,China 2.key laboratory of aerospace information security and Trust computing,ministry of education,wuhan 430072.Hubei,China School of Computer Wuhan University Wuhan Hubei China key laboratory of {2. {2. security and Trust computing Ministry of Education Wuhan Hubei China
This paper presents a trusted-environment construction method based on the underlying hardware. This method aims at protecting the security-sensitive software in the aspects of software loading, running, and storing i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on trusted computing and its development
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 405-433页
作者: SHEN ChangXiang1, ZHANG HuanGuo1?, WANG HuaiMin3, WANG Ji3, ZHAO Bo2. YAN Fei2. YU FaJiang2. ZHANG LiQiang2.& XU MingDi2.Beijing university of Technology, Beijing 10012., China 2.chool of Computer, wuhan university, {2. {2. of aerospace information security and trusted computing of ministry of education, wuhan 430072. China 3School of Computer, National university of Defence Technology, Changsha 430074, China Beijing university of Technology Beijing China School of Computer National University of Defence Technology Changsha China key laboratory of {2. {2. security and trusted computing of ministry of education School of Computer Wuhan University Wuhan China
trusted computing is a novel technology of{2. system security. It has become a new tide in worldwide{2. security area and achieved inspiring accomplishment. In China, the initiative research of trust... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论