咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 理学
    • 3 篇 数学
  • 2 篇 工学
    • 2 篇 网络空间安全
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 group identifica...
  • 1 篇 quasi-period.
  • 1 篇 multi-prover zer...
  • 1 篇 message modifica...
  • 1 篇 black-box simula...
  • 1 篇 nondegenerate
  • 1 篇 leakproof secret...
  • 1 篇 compliance
  • 1 篇 cryptography
  • 1 篇 proofs of knowle...
  • 1 篇 trusted computin...
  • 1 篇 secret sharing
  • 1 篇 proof of knowl-e...
  • 1 篇 collision
  • 1 篇 information secu...
  • 1 篇 constant-round
  • 1 篇 trusted computin...
  • 1 篇 ml-sequence
  • 1 篇 haval-128
  • 1 篇 zero-knowledge p...

机构

  • 1 篇 1. school of mat...
  • 1 篇 state key lab in...
  • 1 篇 1. state key lab...
  • 1 篇 chinese acad sci...

作者

  • 1 篇 yang junhui and ...
  • 1 篇 2 state key labo...
  • 1 篇 2state key lab o...
  • 1 篇 state key labora...
  • 1 篇 zhang wenying1 2...
  • 1 篇 2state key lab o...
  • 1 篇 3shandong provin...
  • 1 篇 3 department of ...
  • 1 篇 tang chunming 1 ...
  • 1 篇 li hongda1 feng ...

语言

  • 5 篇 英文
检索条件"作者=2state key lab of information security,institute of software of chinese academy of sciences,beij.ng 100080,china"
5 条 记 录,以下是1-10 订阅
排序:
Round-optimal zero-knowledge proofs of knowledge for NP
收藏 引用
Science china(information sciences) 2012年 第11期55卷 2473-2484页
作者: LI HongDa1,FEng DengGuo2,LI Bao1 & XUE HaiXia1 1state key lab of information security,Graduate University of chinese academy of sciences,beij.ng 100049,china 2state key lab of information security,institute of software of chinese academy of sciences,beij.ng 100080,china 1. state key lab of information security Graduate University of Chinese Academy of Sciences Beijing 100049 China2. State Key Lab of Information Security Institute of software of Chinese Academy of Sciences Beijing 100080 China
It is well known that all the known black-box zero-knowledge proofs of knowledge for NP are *** there exit constant-round black-box zero-knowledge proofs of knowledge for all NP languages under certain standard assump... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Nondegenerative ML-sequences over ring Z/(2~e)
收藏 引用
chinese Science Bulletin 1999年 第17期44卷 1557-1561页
作者: YAng Junhui and ZHAI Qibininstitute of software , chinese academy of sciences , beij.ng 100080, china state key laboratory of information security , beij.ng 100080, china chinese Acad Sci Inst Software Beijing 100080 Peoples R China state key lab Informat Secur Beijing 100080 Peoples R China
The so-called quasi-period of an ML-sequence has been introduced. It is noted that an ML-sequence may degenerate in the sense that it has the quasi-period shorter than its period, and the problem of constructing the n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A new one-bit diFFerence collision attack on HAVAL-128
收藏 引用
Science china(information sciences) 2012年 第11期55卷 2521-2529页
作者: ZHAng WenYing1,2,3,LI YanYan1 & WU Lei1 1School of information Science and Engineering,Shandong Normal University,Jinan 250014,china 2state key lab of information security,institute of information Engineering,chinese academy of sciences,beij.ng 100093,china 3Shandong Provincial key laboratory for Novel Distributed Computer software Technology,Jinan 250014,china 1. School of information Science and Engineering Shandong Normal University Jinan 250014 China2. State Key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China3. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Leakproof secret sharing protocols with applications to group identification scheme
收藏 引用
Science china(information sciences) 2012年 第5期55卷 1172-1185页
作者: TAng ChunMing 1,2 & GAO ShuHong 3 1 School of Mathematics and information Science,Guangzhou University,Guangzhou 510006,china 2 state key laboratory of information security,institute of software Science,chinese academy of sciences,beij.ng 100049,china 3 Department of Mathematical sciences,Clemson University,SC 29634,USA 1. School of Mathematics and information Science Guangzhou University Guangzhou 510006 China2. State Key Laboratory of Information Security Institute of Software Science Chinese Academy of Sciences Beijing 100049 China3. Department of Mathematical Sciences Clemson University Clemson SC 29634 USA
In a traditional (t,n)-threshold secret sharing scheme,t or more honest participants can reconstruct the secret *** the reconstruction process,the individual shares and the secret key K are revealed,hence K is shared ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Enhancing Trusted Computing Platform security with Compliance Validation
Enhancing Trusted Computing Platform Security with Complianc...
收藏 引用
中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会
作者: CUI Qi~(1,2) SHI Wenchang~(2,3) 1.institute of software,chinese academy of Science beij.ng 100080 2.Craduate University,chinese academy of Science beij.ng 100080 3.MOE DEKE key lab,Renmin University of china beij.ng 100080
The Trusted Computing Group (TCG) has defined specifications for Trusted Computing,but criteria on compliance testing are still not *** is important that the design and implementation of TPM and other components follo... 详细信息
来源: cnki会议 评论