咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 网络空间安全
    • 4 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 建筑学
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 3 篇 cryptanalysis
  • 2 篇 evolutionary cry...
  • 2 篇 information secu...
  • 2 篇 cryptology
  • 1 篇 混沌
  • 1 篇 side channel att...
  • 1 篇 危险因素
  • 1 篇 s-boxes
  • 1 篇 dpa
  • 1 篇 s-box
  • 1 篇 spn
  • 1 篇 toggle count
  • 1 篇 课程融合
  • 1 篇 reverse engmeenn...
  • 1 篇 风险评估量表
  • 1 篇 吻合口漏
  • 1 篇 endangered taxon...
  • 1 篇 differential pow...
  • 1 篇 sca
  • 1 篇 block ciphers

机构

  • 2 篇 武汉大学
  • 1 篇 state key labora...
  • 1 篇 宁波市杭州湾医院
  • 1 篇 常州市武进人民医...
  • 1 篇 college of advan...
  • 1 篇 1. the key labor...
  • 1 篇 cas key laborato...
  • 1 篇 department of zo...
  • 1 篇 state key lab. o...
  • 1 篇 cas key laborato...
  • 1 篇 wuhan botanical ...
  • 1 篇 state grid key l...
  • 1 篇 state key labora...
  • 1 篇 cas key laborato...
  • 1 篇 school of life s...
  • 1 篇 宁波市第一医院
  • 1 篇 state grid xinji...
  • 1 篇 如皋市人民医院
  • 1 篇 school of life s...
  • 1 篇 1. school of com...

作者

  • 2 篇 tang ming
  • 2 篇 唐明
  • 2 篇 qiu zhenlong
  • 2 篇 zhang huanguo
  • 2 篇 张焕国
  • 1 篇 ming bai
  • 1 篇 shujun wei
  • 1 篇 shixiao luo
  • 1 篇 chaodong zhu
  • 1 篇 jingxian liu
  • 1 篇 崔荣
  • 1 篇 zhang huanguo 1 ...
  • 1 篇 lianming gao
  • 1 篇 zhongli sha
  • 1 篇 xuming zhou
  • 1 篇 xuexin chen
  • 1 篇 hong pang
  • 1 篇 ming tang
  • 1 篇 dongyan zhao
  • 1 篇 feng zhang

语言

  • 7 篇 英文
  • 4 篇 中文
检索条件"作者=ZHANG HuanGuo 1,2 , LI ChunLei 1,2 & TANG Ming 1,2 1 School of Computer, wuhan University, wuhan 430079, china"
11 条 记 录,以下是1-10 订阅
排序:
Evolutionary cryptography against multidimensional linear cryptanalysis
收藏 引用
Science china(Information Sciences) 2011年 第12期54卷 2585-2597页
作者: zhang huanguo 1,2 , li chunlei 1,2 & tang ming 1,2 1 school of computer, wuhan university, wuhan 430079, china 2 Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education of china, wuhan university, wuhan 430079, china 1. school of computer Wuhan University Wuhan 430079 China2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education of China Wuhan University Wuhan 430079 China
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Capability of evolutionary cryptosystems against differential cryptanalysis
收藏 引用
Science china(Information Sciences) 2011年 第10期54卷 1991-2000页
作者: zhang huanguo 1,2 ,li chunlei 1,2 & tang ming 1,2 1 school of computer,wuhan university,wuhan 430072,china 2 Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,wuhan university,wuhan 430072,china 1. school of computer Wuhan University Wuhan 430072 China2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education Wuhan University Wuhan 430072 China
The evolutionary cryptosystem is a new *** paper studies its security level resisting against differential *** is shown that the evolutionary cryptosystem possesses higher resistance than its initial fixed cryptosyste... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Extended multivariate public key cryptosystems with secure encryption function
收藏 引用
Science china(Information Sciences) 2011年 第6期54卷 1161-1171页
作者: WANG HouZhen 1,2 , zhang huanguo 1,2 , WANG zhangYi 1,2 & tang ming 1,2 1 The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, school of computer, wuhan university, wuhan 430079, china 2 State Key Laboratory of Software Engineering, wuhan university, wuhan 430072, china 1. The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan 430079 China2. State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Polar differential power attacks and evaluation
收藏 引用
Science china(Information Sciences) 2012年 第7期55卷 1588-1604页
作者: tang ming 1 ,QIU ZhenLong 1 ,GAO Si 1,2 ,YI Mu 3 ,liU ShuBo 1 ,zhang huanguo 1 & JIN YingZhen 1 1 school of computer Science,wuhan university,wuhan 430072,china 2 State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100190,china 3 Centre for computer and Information Security Research school of computer Science and Software Engineering university of Wollongong,Wollongong,NSW 2522,Australia 1. school of computer Science Wuhan University Wuhan 430072 China2. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China3. Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes
收藏 引用
Tsinghua Science and Technology 2018年 第5期23卷 574-585页
作者: ming tang Yuguang li Yanbin li Pengbo Wang Dongyan Zhao Weigao Chen huanguo zhang school of Cyber Science and Engineering Wuhan University Wuhan 430072 China State Key Laboratory of Cryptology Beijing 100878 China State Grid Key Laboratory of PICD & AT Beijing Smart-Chip Microelectronics Technology Co. Ltd. Beijing 100080 China State Grid Xinjiang Electric Power Corporation Maintenance Company Urumqi 830002 China
Masking is one of the most commonly used Side-Channel Attack (SCA) countermeasures and is built on a security framework, such as the ISW framework, and ensures theoretical security through secret sharing. Unfortunat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
一种动态随机数发生器
收藏 引用
武汉大学学报(理学版) 2008年 第5期54卷 513-516页
作者: 李幼名 唐明 张焕国 武汉大学计算机学院 湖北武汉430072
构造了一种动态随机数发生器,将混沌和分组密码结合起来,先利用混沌的混迭特性产生伪随机比特流,然后利用分组密码杂化伪随机比特流,从而提高比特流的伪随机性;为了引入更多的熵,对分组密码的S盒的输入做系数可变的仿射变换.实验结果表... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Toward reverse engineering on secret S-boxes in block ciphers
收藏 引用
Science china(Information Sciences) 2014年 第3期57卷 169-186页
作者: tang ming QIU ZhenLong PENG HongBo HU XiaoBo YI Mu zhang huanguo school of computer Science Wuhan University State Key Lab. of AIS & TC Ministry of EducationWuhan University
It has been widely accepted that the security cryptosystems should be only dependent on the security of their secret ***,there are still secret ciphers with unknown components in their commercial applications due to v... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Reverse Engineering Analysis Based on Differential Fault Analysis Against Secret S- boxes
收藏 引用
china Communications 2012年 第10期9卷 10-22页
作者: tang ming Qiu Zhenlong Deng Hui liu Shubo zhang huanguo State Key Laboratory of AIS & TC Ministry of Education Wuhan University Wuhan 430072 P. R. China school of computers Wuhan University Wuhan 430072 P. R. China
To evaluate the security of cipher algo- rithrrs with secret operations, we built a new reverse engineering analysis based on Differential Fault Analysis (DFA) to recover the secret S-boxes in Secret Private Network... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A joint call for actions to advance taxonomy in china
收藏 引用
Zoological Systematics 2022年 第3期47卷 188-197页
作者: Chaodong Zhu Arong Luo ming Bai Michael COrr Zhonge Hou Siqin Ge Jun Chen Yibo Hu Xuming Zhou Gexia Qiao Hongzhi Kong limin Lu Xiaohua Jin Lei Cai Xinli Wei Ruilin Zhao Wei Miao Qingfeng Wang Zhongli Sha Qiang lin Meng Qu Jianping Jiang Jiatang li Jing Che Xuelong Jiang Xiaoyong Chen lianming Gao Zongxin Ren chunlei Xiang Shixiao Luo Donghui Wu Dong liu Yanqiong Peng Tao Su Chenyang Cai Tianqi Zhu Wanzhi Cai Xingyue liu Hu li Huaijun Xue Zhen Ye Xuexin Chen Pu tang Shujun Wei Hong Pang Qiang Xie Feng zhang Feng zhang Xianjin Peng Aibing zhang Taiping Gao Changfa Zhou Chen Shao libin Ma Zhaoming Wei Yunxia Luan Ziwei Yin Wu Dai Cong Wei Xiaolei Huang Jingxian liu Xiangsheng Chen Tianci Yi Zhisheng zhang Zhulidezi Aishan Qin li Hongying Hu CAS Key Laboratory of Zoological Systematics and Evolution Institute of ZoologyChinese Academy of SciencesBeijing 100101China CAS Key Laboratory of Animal Ecology and Conservation Biology Institute of ZoologyChinese Academy of SciencesBeijing 100101China State Key Laboratory of Systematic and Evolutionary Botany Institute of BotanyChinese Academy of SciencesBeijing 100093China State Key Laboratory of Mycology(SKLM) Institute of MicrobiologyChinese Academy of SciencesBeijing 100101China CAS Key Laboratory of Aquatic Biodiversity and Conservation Institute of HydrobiologyChinese Academy of SciencesWuhan 430072China wuhan Botanical Garden Chinese Academy of SciencesWuhan 430074China Department of Marine Organism Taxonomy&Phylogeny Institute of OceanologyChinese Academy of SciencesQingdao 266071China CAS Key Laboratory of Tropical Marine Bio-resources and Ecology South China Sea Institute of OceanologyChinese Academy of SciencesGuangzhou 510301China CAS Key Laboratory of Mountain Ecological Restoration and Bioresource Utilization&Ecological Restoration and Biodiversity Conservation Key Laboratory of Sichuan Province Chengdu Institute of BiologyChinese Academy of SciencesChengdu 610041China State Key Laboratory of Genetic Resources and Evolution&Yunnan Key Laboratory of Biodiversity and Ecological Security of Gaoligong Mountain Kunming Institute of ZoologyChinese Academy of SciencesKunming 650221China CAS Key Laboratory for Plant Diversity and Biogeography of East Asia Kunming Institute of BotanyChinese Academy of SciencesKunming 650201China CAS Key Laboratory of Plant Resource Conservation and Sustainable Utilization South China Botanical GardenChinese Academy of SciencesGuangzhou 510650China CAS Key Laboratory of Wetland Ecology and Environment Northeast Institute of Geography and AgroecologyChinese Academy of SciencesChangchun 130102China CAS Key Laboratory of Tropical Forest Ecology Xishuangbanna Tropical Botanical GardenChinese Academy of SciencesMenglunMenglaYunnan 66630
Taxonomy plays an important role in understanding the origin, evolution, and ecological functionality of biodiversity. There are large number of unknown species yet to be described by taxonomists, which together with ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
腹腔镜低位直肠癌前切除术后吻合口漏危险因素分析及其风险评估量表应用价值的多中心回顾性研究
收藏 引用
中华消化外科杂志 2021年 第12期20卷 1342-1350页
作者: 骆洋 俞旻皓 敬然 周鸿 袁旦平 崔荣 李勇 张学利 冯仕春 陆少波 王荣国 路春雷 汤少军 汤黎明 张银新 钟鸣 上海交通大学医学院附属仁济医院胃肠外科200127 宁波市杭州湾医院普通外科 浙江宁波315336 宁波市第一医院肛肠外科 浙江宁波315010 上海市嘉定区中医医院普通外科201899 上海市浦东新区公利医院普通外科200135 上海市奉贤区中心医院普通外科201406 南通市第一人民医院普通外科 江苏南通226006 如皋市人民医院普通外科 江苏如皋226599 台州市第一人民医院胃肠外科 浙江台州318020 临沂市人民医院普通外科 山东临沂276005 常州市武进人民医院普通外科 江苏常州213004 常州市第二人民医院普通外科 江苏常州213104 江苏省建湖县人民医院普通外科 江苏盐城224799
目的探讨腹腔镜低位直肠癌前切除术后吻合口漏危险因素及其风险评估量表的应用价值。方法采用回顾性病例对照研究方法。收集2016年1月至2020年11月国内13家医疗中心收治的539例(上海交通大学医学院附属仁济医院248例、宁波市第一医院35... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论