咨询与建议

限定检索结果

文献类型

  • 35 篇 期刊文献

馆藏范围

  • 35 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 8 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 7 篇 网络空间安全
    • 6 篇 信息与通信工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 水利工程
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 船舶与海洋工程
  • 8 篇 医学
    • 4 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
    • 1 篇 中西医结合
  • 5 篇 理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 海洋科学
    • 1 篇 生态学
  • 5 篇 农学
    • 3 篇 水产
    • 1 篇 作物学
    • 1 篇 兽医学
  • 1 篇 法学
    • 1 篇 政治学
  • 1 篇 教育学
  • 1 篇 管理学
    • 1 篇 农林经济管理

主题

  • 3 篇 cryptanalysis
  • 2 篇 密钥交换协议
  • 2 篇 cryptography
  • 1 篇 肾功能
  • 1 篇 孵化率
  • 1 篇 可证明安全性
  • 1 篇 指纹花样
  • 1 篇 产业
  • 1 篇 客运量
  • 1 篇 木本油料
  • 1 篇 量子计算
  • 1 篇 耦合条件
  • 1 篇 辐照试验
  • 1 篇 脉冲电流注入
  • 1 篇 低温等离子射频消...
  • 1 篇 swot
  • 1 篇 finite associati...
  • 1 篇 模锻锤
  • 1 篇 高空电磁脉冲
  • 1 篇 stabilizer

机构

  • 4 篇 福建省邵武市立医...
  • 3 篇 河南科技大学
  • 2 篇 南京市水产科学研...
  • 2 篇 南京师范大学
  • 2 篇 computer school ...
  • 1 篇 九江市中医医院
  • 1 篇 福建医科大学
  • 1 篇 福建省漳州市疾病...
  • 1 篇 湖南科技大学
  • 1 篇 河南中烟工业有限...
  • 1 篇 首都医科大学
  • 1 篇 重庆三峡职业学院
  • 1 篇 北京市交通委员会...
  • 1 篇 空军95596部队
  • 1 篇 江西武夷山国家级...
  • 1 篇 computer school ...
  • 1 篇 huawei technolig...
  • 1 篇 china university...
  • 1 篇 福建武夷烟叶有限...
  • 1 篇 首都医科大学附属...

作者

  • 5 篇 shaowu mao
  • 5 篇 houzhen wang
  • 5 篇 huanguo zhang
  • 4 篇 wanqing wu
  • 3 篇 mao shaowu
  • 3 篇 毛玺
  • 3 篇 zhang huanguo
  • 3 篇 聂少武
  • 3 篇 毛财凤
  • 2 篇 李阁强
  • 2 篇 jinhui liu
  • 2 篇 茆健强
  • 2 篇 唐忠林
  • 2 篇 尹绍武
  • 2 篇 liu jinhui
  • 2 篇 李杰
  • 2 篇 wu wanqing
  • 2 篇 王涛
  • 2 篇 jianwei jia
  • 1 篇 江涛

语言

  • 25 篇 中文
  • 10 篇 英文
检索条件"作者=Shaowu MAO"
35 条 记 录,以下是1-10 订阅
排序:
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 302-311页
作者: Houzhen Wang Huanguo Zhang shaowu mao Wanqing Wu Liqiang Zhang Computer School of Wuhan University Wuhan 430079China the State Key Laboratory of Cryptology Beijing 100878China
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a lattice based key exchange protocol
收藏 引用
Science China(Information Sciences) 2017年 第2期60卷 196-198页
作者: shaowu mao Pei ZHANG Houzhen WANG Huanguo ZHANG Wanqing WU Computer School of Wuhan University The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Huawei Technoligies Co. Ltd. School of Computer Science and Technology Hebei University
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the wo... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 133-143页
作者: Jinhui LIU Huanguo ZHANG Jianwei JIA Houzhen WANG shaowu mao Wanqing WU Computer School of Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC,and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now,no quantum ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an MOR cryptosystem based on a finite associative algebra
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 137-145页
作者: Wanqing WU Huanguo ZHANG Houzhen WANG shaowu mao Shuomei WU Haiqing HAN Computer School of Wuhan University Computer Department Shijiazhuang University School of Mathematics and Physics Hubei Polytechnic University
The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYPTO 2001, Paeng(2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candidate sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 344-351页
作者: Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang Houzhen Wang shaowu mao Computer School of Wuhan University Wuhan 430072China Computer School of Pingdingshan University Pingdingshan 467001China
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A public key cryptosystem based on data complexity under quantum environment
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 48-58页
作者: WU WanQing ZHANG HuanGuo WANG HouZhen mao shaowu JIA JianWei LIU JinHui Computer School Wuhan University
Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA, EIGamal, and ECC classical public key cryptosystems. Th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Key Exchange Protocol Based on Tensor Decomposition Problem
收藏 引用
China Communications 2016年 第3期13卷 174-183页
作者: mao shaowu ZHANG Huanguo WU Wanqing ZHANG Pei SONG Jun LIU Jinhui Computer School of Wuhan University The Key Laboratory of Aerospace Information Security and Trusted ComputingMinistry of EducationWuhan 430072Hubei ProvinceChina China University of Geosciences Wuhan 430074Hubei ProvinceChina Hebei University School of Computer Science and TechnologyHebei UniversityBaoding 071002China
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme
收藏 引用
China Communications 2014年 第9期11卷 124-134页
作者: mao shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen Computer School of Wuhan University The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry ofEducation Wuhan 430072 Hubei Province P. R. China
The emergence of quantum computer will threaten the security of existing public-key cryptosystems,including the Diffie Hellman key exchange protocol,encryption scheme and etc,and it makes the study of resistant quantu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Software Watermarking Scheme Based on Multivariate Public Key Cryptosystem
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第3期21卷 257-261页
作者: SUN Xiaoyan ZHANG maosheng mao shaowu REN Zhengwei ZHANG Huanguo Guangxi Universities Key Laboratory of Complex SystemOptimization and Big Data Processing Yulin Normal UniversityYulin 537000 Guangxi China School of Computer Wuhan University Wuhan 430072Hubei China Wuhan Digital and Engineering Institute Wuhan 430205Hubei China
Software watermarking is an efficient tool to verify the copyright of software. Public key cryptosystem-based watermarking is widely researched. However, the popular public key cryptosystem is not secure under quantum... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Numerical Modeling of Floating Oil Boom Motions in Wave-Current Coupling Conditions
收藏 引用
Journal of Ocean University of China 2017年 第4期16卷 602-608页
作者: SHI Yang LI shaowu ZHANG Huaqin PENG Shitao CHEN Hanbao ZHOU Ran mao Tianyu State Key Laboratory of Hydraulic Engineering Simulation and Safety Tianjin University Tianjin Research Institute for Water Transport Engineering Ministry of Transport
Containment booms are commonly used in collecting and containing spilled oil on the sea surface and in protecting specific sea areas against oil slick spreading.In the present study,a numerical model is proposed based... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论