咨询与建议

限定检索结果

文献类型

  • 159 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 160 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 19 篇 计算机科学与技术...
    • 16 篇 电气工程
    • 15 篇 信息与通信工程
    • 15 篇 土木工程
    • 13 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 10 篇 地质资源与地质工...
    • 7 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 7 篇 矿业工程
    • 6 篇 水利工程
    • 5 篇 力学(可授工学、理...
    • 5 篇 控制科学与工程
    • 5 篇 石油与天然气工程
    • 5 篇 林业工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
  • 33 篇 理学
    • 6 篇 数学
    • 5 篇 化学
    • 5 篇 地质学
    • 4 篇 物理学
    • 4 篇 地球物理学
    • 4 篇 生态学
  • 31 篇 医学
    • 22 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 12 篇 农学
    • 5 篇 植物保护
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 经济学
  • 2 篇 管理学
  • 1 篇 法学

主题

  • 6 篇 cryptography
  • 5 篇 数值模拟
  • 4 篇 动脉粥样硬化
  • 3 篇 人巨细胞病毒
  • 3 篇 数字签名
  • 3 篇 氮化硼
  • 3 篇 巴西橡胶树
  • 3 篇 聚丙烯
  • 3 篇 钙质砂
  • 3 篇 氧化应激
  • 3 篇 cryptanalysis
  • 3 篇 颗粒破碎
  • 3 篇 hash function
  • 2 篇 基因克隆
  • 2 篇 颗粒形状
  • 2 篇 零知识证明
  • 2 篇 防治效果
  • 2 篇 岩溶山区
  • 2 篇 旋转机械
  • 2 篇 橘小实蝇

机构

  • 14 篇 首都医科大学附属...
  • 9 篇 中国科学院武汉岩...
  • 8 篇 海南大学
  • 8 篇 东北石油大学
  • 6 篇 贵州师范大学
  • 5 篇 山东省果树研究所
  • 5 篇 中国热带农业科学...
  • 5 篇 贵州师范学院
  • 5 篇 广西大学
  • 5 篇 武汉大学
  • 5 篇 桂林理工大学
  • 4 篇 中国科学院武汉岩...
  • 4 篇 国网河南省电力公...
  • 4 篇 空天信息安全与可...
  • 4 篇 中原工学院
  • 3 篇 广西岩土力学与工...
  • 3 篇 首都医科大学附属...
  • 3 篇 密码科学技术国家...
  • 3 篇 南宁职业技术学院
  • 3 篇 中北大学

作者

  • 16 篇 魏厚振
  • 15 篇 脱厚珍
  • 12 篇 温后珍
  • 8 篇 王后珍
  • 8 篇 肖厚贞
  • 8 篇 houzhen wang
  • 8 篇 huanguo zhang
  • 7 篇 张焕国
  • 7 篇 孟碧霞
  • 6 篇 王后阵
  • 6 篇 杜艺彤
  • 6 篇 孟庆山
  • 6 篇 贾厚振
  • 5 篇 shaowu mao
  • 5 篇 周后珍
  • 5 篇 wanqing wu
  • 5 篇 韦昌富
  • 5 篇 陈厚振
  • 5 篇 张宇
  • 5 篇 胡厚臻

语言

  • 138 篇 中文
  • 22 篇 英文
检索条件"作者=Houzhen WANG"
160 条 记 录,以下是1-10 订阅
排序:
Quantum Polynomial-Time Fixed-Point Attack for RSA
收藏 引用
China Communications 2018年 第2期15卷 25-32页
作者: Yahui wang Huanguo Zhang houzhen wang School of computer Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education Wuhan University
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a lattice based key exchange protocol
收藏 引用
Science China(Information Sciences) 2017年 第2期60卷 196-198页
作者: Shaowu MAO Pei ZHANG houzhen wang Huanguo ZHANG Wanqing WU Computer School of Wuhan University The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Huawei Technoligies Co. Ltd. School of Computer Science and Technology Hebei University
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the wo... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 302-311页
作者: houzhen wang Huanguo Zhang Shaowu Mao Wanqing Wu Liqiang Zhang Computer School of Wuhan University Wuhan 430079China the State Key Laboratory of Cryptology Beijing 100878China
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Survey on Quantum Information Security
收藏 引用
China Communications 2019年 第10期16卷 1-36页
作者: Huanguo Zhang Zhaoxu Ji houzhen wang Wanqing Wu Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Cyber Security and Computer Hebei UniversityBaoding 071002China
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which off... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Lattice-Based Double-Authentication-Preventing Ring Signature for Security and Privacy in Vehicular Ad-Hoc Networks
收藏 引用
Tsinghua Science and Technology 2019年 第5期24卷 575-584页
作者: Jinhui Liu Yong Yu Jianwei Jia Shijia wang Peiru Fan houzhen wang Huanguo Zhang School of Computer Science Shaanxi Normal University. Xi'an 710119 China Department of Statistics and Actuarial Science Simon Fraser University Burnaby. V5A1S6 Canada School of Cyber Science and Engineering. Wuhan University Wuhan 430072China
Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an MOR cryptosystem based on a finite associative algebra
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 137-145页
作者: Wanqing WU Huanguo ZHANG houzhen wang Shaowu MAO Shuomei WU Haiqing HAN Computer School of Wuhan University Computer Department Shijiazhuang University School of Mathematics and Physics Hubei Polytechnic University
The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYPTO 2001, Paeng(2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candidate sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 133-143页
作者: Jinhui LIU Huanguo ZHANG Jianwei JIA houzhen wang Shaowu MAO Wanqing WU Computer School of Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC,and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now,no quantum ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 344-351页
作者: Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang houzhen wang Shaowu Mao Computer School of Wuhan University Wuhan 430072China Computer School of Pingdingshan University Pingdingshan 467001China
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Effect of coral sand on the mechanical properties and hydration mechanism of magnesium potassium phosphate cement mortar
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2024年 第2期25卷 116-129页
作者: Hao LIU Huamei YANG houzhen WEI Jining YU Qingshan MENG Rongtao YAN College of Civil Engineering and Architecture Guilin University of TechnologyGuilin541004China Guangxi Key Laboratory of Geomechanics and Geotechnical Engineering Guilin University of TechnologyGuilin541004China State Key Laboratory of Geomechanics and Geotechnical Engineering Institute of Rock and Soil MechanicsChinese Academy of SciencesWuhan430071China School of Intelligent Construction Wuchang University of TechnologyWuhan430002China Hydraulic Concrete Institute China Three Gorges CorporationBeijing100038China The First Railway Survey and Design Institute Group Corporation Xi’an710043China
Damaged structures on coral islands have been spalling and cracking due to the dual corrosion of tides and waves.To ensure easy access to aggregate materials,magnesium potassium phosphate cement(MKPC)and coral sand(CS... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A public key cryptosystem based on data complexity under quantum environment
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 48-58页
作者: WU WanQing ZHANG HuanGuo wang houzhen MAO ShaoWu JIA JianWei LIU JinHui Computer School Wuhan University
Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA, EIGamal, and ECC classical public key cryptosystems. Th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论