咨询与建议

限定检索结果

文献类型

  • 781 篇 期刊文献
  • 311 篇 会议

馆藏范围

  • 1,092 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 806 篇 工学
    • 190 篇 计算机科学与技术...
    • 151 篇 网络空间安全
    • 93 篇 信息与通信工程
    • 92 篇 仪器科学与技术
    • 77 篇 电子科学与技术(可...
    • 76 篇 机械工程
    • 75 篇 控制科学与工程
    • 73 篇 软件工程
    • 49 篇 地质资源与地质工...
    • 38 篇 光学工程
    • 34 篇 测绘科学与技术
    • 30 篇 材料科学与工程(可...
    • 30 篇 电气工程
    • 25 篇 环境科学与工程(可...
    • 23 篇 农业工程
    • 22 篇 水利工程
    • 21 篇 化学工程与技术
    • 17 篇 交通运输工程
  • 307 篇 理学
    • 96 篇 数学
    • 41 篇 物理学
    • 38 篇 生物学
    • 35 篇 系统科学
    • 24 篇 大气科学
    • 21 篇 地理学
    • 21 篇 生态学
    • 17 篇 地球物理学
  • 106 篇 管理学
    • 85 篇 管理科学与工程(可...
  • 86 篇 农学
    • 43 篇 农业资源与环境
    • 19 篇 作物学
  • 55 篇 军事学
    • 54 篇 军队指挥学
  • 19 篇 医学
  • 16 篇 经济学
  • 11 篇 艺术学
  • 7 篇 教育学
  • 6 篇 法学
  • 3 篇 哲学
  • 2 篇 文学

主题

  • 20 篇 网络安全
  • 15 篇 信息安全
  • 14 篇 cryptography
  • 13 篇 密码学
  • 13 篇 计算机网络
  • 13 篇 quantum
  • 11 篇 model
  • 10 篇 of
  • 9 篇 gis
  • 8 篇 中国
  • 8 篇 数字签名
  • 8 篇 安全性
  • 8 篇 sharing
  • 7 篇 simulation
  • 7 篇 remote sensing
  • 7 篇 authentication
  • 7 篇 入侵检测
  • 7 篇 secret
  • 6 篇 optimization
  • 6 篇 function

机构

  • 28 篇 清华大学
  • 24 篇 中国科学院大学
  • 23 篇 中国科学院研究生...
  • 21 篇 北京邮电大学
  • 15 篇 中国科技大学
  • 14 篇 中国科学技术大学
  • 11 篇 state key labora...
  • 11 篇 西安电子科技大学
  • 10 篇 中国科学院地理科...
  • 9 篇 北京交通大学
  • 9 篇 武汉大学
  • 8 篇 南京大学
  • 8 篇 北京航空航天大学
  • 8 篇 南京信息工程大学
  • 8 篇 哈尔滨工业大学
  • 7 篇 北京大学
  • 6 篇 key laboratory o...
  • 6 篇 中国科学院研究生...
  • 6 篇 中国科学院软件研...
  • 6 篇 北京师范大学

作者

  • 87 篇 china
  • 28 篇 beijing
  • 20 篇 吕述望
  • 16 篇 杨义先
  • 12 篇 冯登国
  • 10 篇 tsinghua univers...
  • 9 篇 chinese academy ...
  • 8 篇 beijing jiaotong...
  • 7 篇 beijing 100084
  • 7 篇 p.r.china
  • 7 篇 钮心忻
  • 6 篇 卿斯汉
  • 5 篇 方滨兴
  • 5 篇 刘振华
  • 5 篇 谢立
  • 5 篇 beijing universi...
  • 5 篇 胡铭曾
  • 5 篇 china)
  • 5 篇 刘宝旭
  • 4 篇 shanghai

语言

  • 713 篇 英文
  • 379 篇 中文
检索条件"作者=3.State Key Laboratory of Information Security , beijing 100049,{3."
1092 条 记 录,以下是21-30 订阅
排序:
SQUARE attack on block ciphers with low algebraic degree
收藏 引用
Science China(information Sciences) 2010年 第10期53卷 1988-1995页
作者: SUN Bing 1 , LI RuiLin 1 , QU LongJiang 1,3.& LI Chao 1,2,3.1 Science College of National University of Defense Technology, Changsha 410073. China 2 state key laboratory of {3. {3., Graduate University of Chinese Academy of Sciences, beijing 100049, China 3.National Mobile Communications Research laboratory, Southeast University, Nanjing 210096, China 1. Science College of National University of Defense Technology Changsha 410073 China3. National Mobile Communications Research Laboratory Southeast University Nanjing 210096 China2. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China
By using an algebraic method, the mathematical foundation of SQUARE attack is studied in this paper. We point out that a SQUARE distinguisher exists if and only if the degree of the polynomial function between n-bit i... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
security model and modular design of fair authentication key exchange protocols
收藏 引用
Science China(information Sciences) 2010年 第2期53卷 278-287页
作者: FENG DengGuo & CHEN WeiDong state key laboratory of {3. {3., Institute of Software, Chinese Academy of Sciences, beijing 100190, China 1. state key laboratory of {3. {3. Institute of Software Chinese Academy of Sciences Beijing 100190 China
It is traditionally assumed that the legal two parties in authentication key exchange (AKE) communications are both credible. However, in more and more network applications nowadays, it is often required that such pro... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Simulation study of phase retrieval for hard X-ray in-line phase contrast imaging
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2005年 第4期48卷 450-458页
作者: YU Bin1,2, PENG Xiang1,2, TIAN Jindong1, NIU Hanben1, DIAO Luhong3.& LI Hua3.1. key laboratory of Optoelectronic Devices and Systems of Ministry of Education, Institute of Optoelec- tronics, Shenzhen University, Shenzhen 518060, China 2. state key laboratory of Precision Measuring Technology and Instruments, Tianjin University, Tianjin 3.0072,China 3. key laboratory of Intelligent information Processing, Institute of Computing Technology, Chinese Academy of Sciences, beijing 100080,China 1. key laboratory of Optoelectronic Devices and Systems of Ministry of Education Institute of Optoelectronics Shenzhen University 518060 Shenzhen China 2. state key laboratory of Precision Measuring Technology and Instruments Tianjin University 300072 Tianjin China 3. key laboratory of Intelligent information Processing Institute of Computing Technology Chinese Academy of Sciences 100080 Beijing China
Two algorithms for the phase retrieval of hard X-ray in-line phase contrast imaging are presented. One is referred to as Iterative Angular Spectrum Algorithm (IASA) and the other is a hybrid algorithm that combines IA... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Analysis of a kind of quantum cryptographic schemes based on secret sharing
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2009年 第9期52卷 1313-1316页
作者: ZHANG XingLan1 & JI DongYao2 1 College of Computer Science and Technology, beijing University of Technology, beijing 100124, China 2 state {3. {3. of information security, Graduate University of Chinese Academy of Sciences, beijing 100049, China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state key laboratory of {3. {3. Graduate University of Chinese Academy of Sciences Beijing 100049 China
Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This proces... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Power functions with low uniformity on odd characteristic finite fields
收藏 引用
Science China Mathematics 2010年 第8期53卷 1931-1940页
作者: ZHA ZhengBang 1,3.& WANG XueLi 2 1 School of Mathematical Sciences,Luoyang Normal University,Luoyang 471022,China 2 School of Mathematical Sciences,South China Normal University,Guangzhou 51063.,China 3.state key laboratory of {3. {3.,Graduate University of Chinese Academy of Sciences,beijing 100049,China 1. School of Mathematical Sciences Luoyang Normal University Luoyang 471022 China3. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China2. School of Mathematical Sciences South China Normal University Guangzhou 510631 China
In this paper,we give some new low differential uniformity of some power functions defined on finite fields with odd *** corollaries of the uniformity,we obtain two families of almost perfect nonlinear functions in GF... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Nondegenerative ML-sequences over ring Z/(2~e)
收藏 引用
Chinese Science Bulletin 1999年 第17期44卷 1557-1561页
作者: YANG Junhui and ZHAI QibinInstitute of Software , Chinese Academy of Sciences , beijing 100080, China state key {3. of {3. security , beijing 100080, China Chinese Acad Sci Inst Software Beijing 100080 Peoples R China state key Lab Informat Secur Beijing 100080 Peoples R China
The so-called quasi-period of an ML-sequence has been introduced. It is noted that an ML-sequence may degenerate in the sense that it has the quasi-period shorter than its period, and the problem of constructing the n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3. YANG YiXian1,2,3. WANG LiCheng1,2,3.& NIU XinXin1,2,3.1information security Center, state {3. {3. of Networking and Switching Technology, beijing University of Posts and Telecommunications, beijing 100876, China 2{3. {3. of Network and information Attack and Defence Technology of MOE, beijing University of Posts and Telecommunications, beijing 100876, China 3.ational Engineering {3. for Disaster Backup and Recovery, beijing University of Posts and Telecommunications, beijing 100876, China 1. information security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CMQV+:An authenticated key exchange protocol from CMQV
收藏 引用
Science China(information Sciences) 2012年 第7期55卷 1666-1674页
作者: LI Hui 1,2 & WU ChuanKun 1 1 state key laboratory of {3. {3.,Institute of Software,Chinese Academy of Sciences,beijing 100190,China 2 Graduate University of Chinese Academy of Sciences,beijing 100049,China 1. state key laboratory of {3. {3. Institute of Software Chinese Academy of Sciences Beijing 100190 China2. Graduate University of Chinese Academy of Sciences Beijing 100049 China
Ustaoglu presents a secure and efficient key exchange protocol named CMQV,based on the design rationales of HMQV and *** with the latter two protocols,on one hand,CMQV achieves high performance of HMQV,and on the othe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
On designated-weight Boolean functions with highest algebraic immunity
收藏 引用
Science China Mathematics 2010年 第11期53卷 2847-2854页
作者: LIU MeiCheng1,3. DU YuSong2, PEI DingYi2 & LIN DongDai1 1The state key laboratory of {3. {3., Institute of Software of Chinese Academy of Sciences, beijing 100190, China 2College of Mathematics and {3. Sciences, Guangzhou University, Guangzhou 510006, China 3.raduate University of Chinese Academy of Sciences, beijing 100049, China 1. The state key laboratory of {3. {3. Institute of Software of Chinese Academy of Sciences Beijing 100190 China3. Graduate University of Chinese Academy of Sciences Beijing 100049 China2. College of Mathematics and Information Sciences Guangzhou University Guangzhou 510006 China
Algebraic immunity has been considered as one of cryptographically significant properties for Boolean functions. In this paper, we study ∑d-1 i=0 (ni)-weight Boolean functions with algebraic immunity achiev-ing the m... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A two-round honest-verifier zero-knowledge protocol
收藏 引用
Science China(information Sciences) 2010年 第5期53卷 954-963页
作者: LIU HanWu 1,2 & LIN DongDai 1 1 The state key laboratory of {3. {3., Institute of Software, Chinese Academy of Sciences, beijing 100190, China 2 Graduate University of the Chinese Academy of Sciences, beijing 100049, China 1. The state key laboratory of {3. {3. Institute of Software Chinese Academy of Sciences Beijing 100190 China2. Graduate University of the Chinese Academy of Sciences Beijing 100049 China
Since the concept of zero-knowledge protocols was introduced, it has attracted a lot of attention and in turn showed significant effect on the development of cryptography, complexity theory and other areas. The round ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论