咨询与建议

限定检索结果

文献类型

  • 163 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 164 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 22 篇 计算机科学与技术...
    • 19 篇 信息与通信工程
    • 17 篇 电气工程
    • 17 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 材料科学与工程(可...
    • 13 篇 机械工程
    • 11 篇 化学工程与技术
    • 11 篇 地质资源与地质工...
    • 9 篇 水利工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 力学(可授工学、理...
    • 7 篇 矿业工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 软件工程
    • 6 篇 动力工程及工程热...
    • 6 篇 控制科学与工程
    • 6 篇 建筑学
    • 6 篇 石油与天然气工程
    • 5 篇 林业工程
  • 36 篇 医学
    • 25 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 33 篇 理学
    • 10 篇 化学
    • 6 篇 地质学
    • 5 篇 数学
  • 23 篇 农学
    • 8 篇 农业资源与环境
    • 5 篇 植物保护
  • 7 篇 军事学
    • 7 篇 军队指挥学
  • 6 篇 管理学
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 经济学
  • 1 篇 法学

主题

  • 6 篇 cryptography
  • 5 篇 数值模拟
  • 4 篇 动脉粥样硬化
  • 3 篇 人巨细胞病毒
  • 3 篇 数字签名
  • 3 篇 氮化硼
  • 3 篇 巴西橡胶树
  • 3 篇 聚丙烯
  • 3 篇 钙质砂
  • 3 篇 氧化应激
  • 3 篇 cryptanalysis
  • 3 篇 颗粒破碎
  • 3 篇 hash function
  • 2 篇 基因克隆
  • 2 篇 颗粒形状
  • 2 篇 零知识证明
  • 2 篇 防治效果
  • 2 篇 岩溶山区
  • 2 篇 旋转机械
  • 2 篇 橘小实蝇

机构

  • 16 篇 首都医科大学附属...
  • 9 篇 中国科学院武汉岩...
  • 8 篇 海南大学
  • 8 篇 东北石油大学
  • 6 篇 贵州师范大学
  • 5 篇 山东省果树研究所
  • 5 篇 中国热带农业科学...
  • 5 篇 贵州师范学院
  • 5 篇 广西大学
  • 5 篇 武汉大学
  • 5 篇 桂林理工大学
  • 4 篇 中国科学院武汉岩...
  • 4 篇 国网河南省电力公...
  • 4 篇 空天信息安全与可...
  • 4 篇 中原工学院
  • 3 篇 江苏大学
  • 3 篇 广西岩土力学与工...
  • 3 篇 首都医科大学附属...
  • 3 篇 密码科学技术国家...
  • 3 篇 南宁职业技术学院

作者

  • 16 篇 魏厚振
  • 16 篇 脱厚珍
  • 12 篇 温后珍
  • 8 篇 王后珍
  • 8 篇 肖厚贞
  • 8 篇 houzhen wang
  • 8 篇 huanguo zhang
  • 7 篇 张焕国
  • 7 篇 孟碧霞
  • 6 篇 王后阵
  • 6 篇 杜艺彤
  • 6 篇 孟庆山
  • 6 篇 贾厚振
  • 5 篇 shaowu mao
  • 5 篇 周后珍
  • 5 篇 wanqing wu
  • 5 篇 韦昌富
  • 5 篇 陈厚振
  • 5 篇 张宇
  • 5 篇 胡厚臻

语言

  • 142 篇 中文
  • 22 篇 英文
检索条件"作者=Houzhen wang"
164 条 记 录,以下是1-10 订阅
排序:
Quantum Polynomial-Time Fixed-Point Attack for RSA
收藏 引用
China Communications 2018年 第2期15卷 25-32页
作者: Yahui wang Huanguo Zhang houzhen wang School of computer Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education Wuhan University
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a lattice based key exchange protocol
收藏 引用
Science China(Information Sciences) 2017年 第2期60卷 196-198页
作者: Shaowu MAO Pei ZHANG houzhen wang Huanguo ZHANG Wanqing WU Computer School of Wuhan University The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Huawei Technoligies Co. Ltd. School of Computer Science and Technology Hebei University
A lattice is a set of points in n-dimensional space with a periodic ***-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the worst-case hardn... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 302-311页
作者: houzhen wang Huanguo Zhang Shaowu Mao Wanqing Wu Liqiang Zhang Computer School of Wuhan University Wuhan 430079China the State Key Laboratory of Cryptology Beijing 100878China
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Survey on Quantum Information Security
收藏 引用
China Communications 2019年 第10期16卷 1-36页
作者: Huanguo Zhang Zhaoxu Ji houzhen wang Wanqing Wu Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Cyber Security and Computer Hebei UniversityBaoding 071002China
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which off... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Lattice-Based Double-Authentication-Preventing Ring Signature for Security and Privacy in Vehicular Ad-Hoc Networks
收藏 引用
Tsinghua Science and Technology 2019年 第5期24卷 575-584页
作者: Jinhui Liu Yong Yu Jianwei Jia Shijia wang Peiru Fan houzhen wang Huanguo Zhang School of Computer Science Shaanxi Normal University. Xi'an 710119 China Department of Statistics and Actuarial Science Simon Fraser University Burnaby. V5A1S6 Canada School of Cyber Science and Engineering. Wuhan University Wuhan 430072China
Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an MOR cryptosystem based on a finite associative algebra
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 137-145页
作者: Wanqing WU Huanguo ZHANG houzhen wang Shaowu MAO Shuomei WU Haiqing HAN Computer School of Wuhan University Computer Department Shijiazhuang University School of Mathematics and Physics Hubei Polytechnic University
The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYPTO 2001, Paeng(2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candidate sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 133-143页
作者: Jinhui LIU Huanguo ZHANG Jianwei JIA houzhen wang Shaowu MAO Wanqing WU Computer School of Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC,and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now,no quantum ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A public key cryptosystem based on data complexity under quantum environment
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 48-58页
作者: WU WanQing ZHANG HuanGuo wang houzhen MAO ShaoWu JIA JianWei LIU JinHui Computer School Wuhan University
Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA, EIGamal, and ECC classical public key cryptosystems. Th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 344-351页
作者: Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang houzhen wang Shaowu Mao Computer School of Wuhan University Wuhan 430072China Computer School of Pingdingshan University Pingdingshan 467001China
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Branch-Chain-Rich Diisopropyl Ether with Steric Hindrance Facilitates Stable Cycling of Lithium Batteries at-20℃
收藏 引用
Nano-Micro Letters 2024年 第10期16卷 121-135页
作者: houzhen Li Yongchao Kang wangran Wei Chuncheng Yan Xinrui Ma Hao Chen Yuanhua Sang Hong Liu Shuhua wang State Key Laboratory of Crystal Materials Shandong UniversityJinan 250100People's Republic of China
Li metal batteries(LMBs)offer signifi-cant potential as high energy density alternatives;nev-ertheless,their performance is hindered by the slow desolvation process of electrolytes,particularly at low temperatures(LT)... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论