咨询与建议

限定检索结果

文献类型

  • 52 篇 期刊文献

馆藏范围

  • 52 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44 篇 工学
    • 29 篇 计算机科学与技术...
    • 27 篇 网络空间安全
    • 7 篇 软件工程
    • 4 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 地球物理学
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...

主题

  • 6 篇 cryptography
  • 6 篇 模糊测试
  • 4 篇 漏洞挖掘
  • 4 篇 hash function
  • 3 篇 对抗攻击
  • 3 篇 information secu...
  • 2 篇 key
  • 2 篇 sgx
  • 2 篇 数字签名
  • 2 篇 物联网
  • 2 篇 目标检测
  • 2 篇 security
  • 2 篇 trusted computin...
  • 2 篇 抗量子密码
  • 2 篇 深度学习
  • 2 篇 java web
  • 2 篇 mq problem
  • 1 篇 key exchange pro...
  • 1 篇 evolutionary cry...
  • 1 篇 resist quantum

机构

  • 22 篇 武汉大学
  • 15 篇 空天信息安全与可...
  • 3 篇 key laboratory o...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...
  • 2 篇 空天信息安全与可...
  • 2 篇 the key lab of a...
  • 2 篇 密码科学技术国家...
  • 2 篇 the key laborato...
  • 2 篇 先进密码技术与系...
  • 2 篇 the key laborato...
  • 2 篇 中国电力科学研究...
  • 2 篇 key laboratory o...
  • 2 篇 地球空间信息技术...
  • 2 篇 the department o...
  • 1 篇 佐治亚理工学院
  • 1 篇 国网浙江省电力有...
  • 1 篇 school of comput...
  • 1 篇 河北大学
  • 1 篇 智能电网保护和运...

作者

  • 8 篇 huanguo zhang
  • 8 篇 张焕国
  • 6 篇 王鹃
  • 5 篇 王后珍
  • 5 篇 王丽娜
  • 4 篇 李俊娥
  • 4 篇 houzhen wang
  • 4 篇 张桐
  • 3 篇 张子君
  • 3 篇 wanqing wu
  • 3 篇 王宇
  • 3 篇 陈晶
  • 3 篇 汪欣欣
  • 3 篇 杜瑞颖
  • 3 篇 何琨
  • 2 篇 张锐文
  • 2 篇 shaowu mao
  • 2 篇 张冲
  • 2 篇 龚家新
  • 2 篇 佘计思

语言

  • 31 篇 中文
  • 21 篇 英文
检索条件"作者=WANG Houzhen1,2,ZHANG Huanguo1,2 1.Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,wuhan university,wuhan 430072,hubei,china"
52 条 记 录,以下是1-10 订阅
排序:
A Fast Pseudorandom Number Generator with BLAKE Hash Function
收藏 引用
wuhan university Journal of Natural Sciences 2010年 第5期15卷 393-397页
作者: wang houzhen1,2,zhang huanguo1,2 1.key laboratory of aerospace information security and trusted computing of ministry of education,wuhan university,wuhan 430072,hubei,china 2.School of Computer,wuhan university,wuhan 430072,hubei,china key laboratory of aerospace information security and trusted computing of ministry of education Wuhan University Wuhan Hubei China School of Computer Wuhan University Wuhan Hubei China
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test *** th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Extended multivariate public key cryptosystems with secure encryption function
收藏 引用
Science china(information Sciences) 2011年 第6期54卷 1161-1171页
作者: wang houzhen 1,2 , zhang huanguo 1,2 , wang zhangYi 1,2 & TANG Ming 1,2 1 The key laboratory of aerospace information security and trusted computing, ministry of education, School of Computer, wuhan university, wuhan 430079, china 2 State key laboratory of Software Engineering, wuhan university, wuhan 430072, china The key laboratory of aerospace information security and trusted computing Ministry of Education School of Computer Wuhan University Wuhan China State key laboratory of Software Engineering Wuhan University Wuhan China
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new perturbation algorithm and enhancing security of SFLASH signature scheme
收藏 引用
Science china(information Sciences) 2010年 第4期53卷 760-768页
作者: wang houzhen1,2, zhang huanguo1,2*, GUAN HaiMing3 & HAN HaiQing1,2 1The key laboratory of aerospace information security and trusted computing, ministry of education, wuhan university, wuhan 430072, china 2School of Computer, wuhan university, wuhan 430079, china 3Chinese Electronic Equipment System Corporation, Beijing 100039, china The key laboratory of aerospace information security and trusted computing Ministry of Education Wuhan University Wuhan China School of Computer Wuhan University Wuhan China Chinese Electronic Equipment System Corporation Beijing China
This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPKCs). Eur... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Design theory and method of multivariate hash function
收藏 引用
Science china(information Sciences) 2010年 第10期53卷 1977-1987页
作者: wang houzhen 1,2 , zhang huanguo 1 , WU QianHong 1 , zhang Yu 1 , LI ChunLei 1 & zhang XinYu 1 1 The key laboratory of aerospace information security and trusted computing, ministry of education, School of Computer, wuhan university, wuhan 430072, china 2 key laboratory of Mathematics Mechanization, Beijing 100080, china The key laboratory of aerospace information security and trusted computing Ministry of Education School of Computer Wuhan University Wuhan China key laboratory of Mathematics Mechanization Beijing China
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science china(information Sciences) 2012年 第4期55卷 911-920页
作者: wang Chao 1,zhang huanguo 2,3 & LIU LiLi 4 1.key Lab of Specialty Fiber Optics and Optical Access Network,ministry of education,Shanghai university,Shanghai 200072,china 2 Computer School of wuhan university,wuhan 430072,china 3 key laboratory of aerospace information security and trusted computing ministry of education,wuhan 430072,china 4 Huawei Technologies CO.LTD.,Shanghai 201206,china key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Shanghai China Computer School of wuhan university Wuhan China key laboratory of aerospace information security and trusted computing ministry of education Wuhan China Huawei Technologies CO. LTD. Shanghai China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on trusted computing and its development
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 405-433页
作者: SHEN ChangXiang1, zhang huanguo1?, wang HuaiMin3, wang Ji3, ZHAO Bo2, YAN Fei2, YU FaJiang2, zhang LiQiang2 & XU MingDi21Beijing university of Technology, Beijing 100124, china 2School of Computer, wuhan university, key laboratory of aerospace information security and trusted computing of ministry of education, wuhan 430072, china 3School of Computer, National university of Defence Technology, Changsha 430074, china Beijing university of Technology Beijing China School of Computer National University of Defence Technology Changsha China key laboratory of aerospace information security and trusted computing of ministry of education School of Computer Wuhan University Wuhan China
trusted computing is a novel technology of information system security. It has become a new tide in worldwide information security area and achieved inspiring accomplishment. In china, the initiative research of trust... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A New Secure Password Authentication Scheme Using Smart Cards
收藏 引用
wuhan university Journal of Natural Sciences 2008年 第6期13卷 739-743页
作者: wang Bangju1,2, wang Yuhua3, zhang huanguo1 1. School of Computer, wuhan university/key laboratory of aerospace information security and Trust computing of ministry of education, wuhan 430072, hubei, china 2. School of Science, Huazhong Agricultural university, wuhan 430070, hubei, china 3. College of information Science and Engineering, Henan university of Technology Zhengzhou 450001, Henan, china School of Computer Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education Wuhan China School of Science Huazhong Agricultural University Wuhan China College of information Science and Engineering Henan University of Technology Zhengzhou China
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum Polynomial-Time Fixed-Point Attack for RSA
收藏 引用
china Communications 2018年 第2期15卷 25-32页
作者: Yahui wang huanguo zhang houzhen wang School of computer Wuhan University key laboratory of aerospace information security and trusted computing ministry of education Wuhan University
security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a lattice based key exchange protocol
收藏 引用
Science china(information Sciences) 2017年 第2期60卷 196-198页
作者: Shaowu MAO Pei zhang houzhen wang huanguo zhang Wanqing WU Computer School of wuhan university The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Huawei Technoligies Co. Ltd. School of Computer Science and Technology Hebei University
A lattice is a set of points in n-dimensional space with a periodic ***-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the worst-case hardn... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Survey on Quantum information security
收藏 引用
china Communications 2019年 第10期16卷 1-36页
作者: huanguo zhang Zhaoxu Ji houzhen wang Wanqing Wu key laboratory of aerospace information security and trusted computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Cyber security and Computer Hebei UniversityBaoding 071002China
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which off... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论