咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 理学
    • 3 篇 数学
  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 evolutionary cry...
  • 1 篇 ant algorithm
  • 1 篇 byzantine genera...
  • 1 篇 ecs
  • 1 篇 complex multipli...
  • 1 篇 evolutionary alg...
  • 1 篇 hmm
  • 1 篇 ecc
  • 1 篇 aco
  • 1 篇 pascal's triangl...
  • 1 篇 wireless sensor ...
  • 1 篇 secure ec select...
  • 1 篇 evolutionary cry...
  • 1 篇 elliptic curves ...
  • 1 篇 weber polynomial
  • 1 篇 weil theorem
  • 1 篇 ant colony algor...
  • 1 篇 secure curves
  • 1 篇 koblitz ec

机构

  • 2 篇 the key lab of a...
  • 2 篇 the key laborato...
  • 2 篇 the department o...
  • 1 篇 department of co...
  • 1 篇 institute of com...
  • 1 篇 china informatio...
  • 1 篇 ltd. huawei
  • 1 篇 department of co...
  • 1 篇 key lab of speci...
  • 1 篇 computer school ...
  • 1 篇 huawei technolog...
  • 1 篇 key laboratory o...

作者

  • 3 篇 chao wang
  • 3 篇 jie wu
  • 3 篇 feng hu
  • 2 篇 huanguo zhang
  • 1 篇 jiawei xu
  • 1 篇 刘礼黎
  • 1 篇 王潮
  • 1 篇 shiyi xu
  • 1 篇 3 key laboratory...
  • 1 篇 zhenhua zhang
  • 1 篇 wang chao 1 zhan...
  • 1 篇 keda wang
  • 1 篇 2 computer schoo...
  • 1 篇 张焕国
  • 1 篇 4 huawei technol...

语言

  • 4 篇 英文
  • 1 篇 中文
检索条件"作者=WANG Chao 1,ZHANG HuanGuo 2,3 & LIU LiLi 4 1 Key Lab of Specialty Fiber Optics and Optical Access Network,Ministry of Education,Shanghai University,Shanghai 200072,china"
5 条 记 录,以下是1-10 订阅
排序:
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science china(Information Sciences) 2012年 第4期55卷 911-920页
作者: wang chao 1,zhang huanguo 2,3 & liu lili 4 1 key lab of specialty fiber optics and optical access network,ministry of education,shanghai university,shanghai 200072,china 2 Computer School of Wuhan university,Wuhan 430072,china 3 key laboratory of Aerospace Information Security and Trusted Computing ministry of education,Wuhan 430072,china 4 Huawei Technologies CO.LTD.,shanghai 201206,china 1. key lab of specialty fiber optics and optical access network Ministry of Education Shanghai University Shanghai 200072 China2. Computer School of Wuhan University Wuhan 430072 China3. Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 China4. Huawei Technologies CO. LTD. Shanghai 201206 China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 499-510页
作者: chao wang Feng Hu huanguo zhang Jie Wu the key laboratory of specialty fiber optics and optical access networks School of Communication and Information EngineeringShanghai University the Department of Computer and Information Sciences Temple University the key lab of Aerospace Information Security and Trusted Computing Wuhan University
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Simple Method for Realizing Weil Theorem in Secure ECC Generation
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 511-519页
作者: Feng Hu chao wang huanguo zhang Jie Wu the key laboratory of specialty fiber optics and optical access networks School of Communication and Information EngineeringShanghai University the Department of Computer and Information Sciences Temple University the key lab of Aerospace Information Security and Trusted Computing Wuhan University
How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
收藏 引用
china Communications 2011年 第4期8卷 41-49页
作者: 王潮 张焕国 刘礼黎 key lab of specialty fiber optics and optical access network Ministry of Education Shanghai University key laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School Wuhan University Huawei Technologies Co. Ltd
Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,whic... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Byzantine Fault-Tolerant Routing for Large-Scale Wireless Sensor networks Based on Fast ECDSA
收藏 引用
Tsinghua Science and Technology 2015年 第6期20卷 627-633页
作者: Jiawei Xu Keda wang chao wang Feng Hu Zhenhua zhang Shiyi Xu Jie Wu Department of Communication and Information Engineering Shanghai University china Information Security Research Institute Ltd. Huawei Institute of Computer Engineering and Science Shanghai University Department of Computer and Information Sciences Temple University
Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Gen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论