咨询与建议

限定检索结果

文献类型

  • 76 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67 篇 工学
    • 44 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 28 篇 网络空间安全
    • 27 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 9 篇 材料科学与工程(可...
    • 6 篇 软件工程
    • 2 篇 机械工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 42 篇 理学
    • 31 篇 数学
    • 11 篇 物理学
    • 6 篇 天文学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 5 篇 图书情报与档案管...
  • 4 篇 医学
    • 4 篇 临床医学

主题

  • 81 篇 cryptanalysis
  • 15 篇 cryptography
  • 8 篇 stream cipher
  • 6 篇 block cipher
  • 5 篇 rsa
  • 4 篇 cipher
  • 4 篇 fault attack
  • 4 篇 block
  • 4 篇 encryption
  • 3 篇 lll algorithm
  • 3 篇 image encryption
  • 3 篇 post-quantum com...
  • 3 篇 attack
  • 3 篇 quantum
  • 3 篇 information secu...
  • 3 篇 security
  • 3 篇 lattice basis re...
  • 3 篇 cryptology
  • 3 篇 chaos
  • 3 篇 differential

机构

  • 4 篇 computer school ...
  • 3 篇 key laboratory o...
  • 2 篇 shandong univers...
  • 2 篇 tsinghua nationa...
  • 2 篇 school of scienc...
  • 2 篇 school of softwa...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 graduate univers...
  • 2 篇 zhengzhou inform...
  • 2 篇 institute for ad...
  • 1 篇 school of manage...
  • 1 篇 college of compu...
  • 1 篇 state key lab. o...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...
  • 1 篇 dept.of computer...
  • 1 篇 department of in...
  • 1 篇 department of co...

作者

  • 4 篇 zhang huanguo
  • 3 篇 shaowu mao
  • 3 篇 houzhen wang
  • 3 篇 liu jinhui
  • 3 篇 李大兴
  • 3 篇 huanguo zhang
  • 3 篇 jia jianwei
  • 2 篇 ma zhen
  • 2 篇 dawu gu
  • 2 篇 wanqing wu
  • 2 篇 jinhui liu
  • 2 篇 qi wenfeng
  • 2 篇 李大为
  • 2 篇 王兴元
  • 2 篇 wang yan
  • 2 篇 hu yu-pu
  • 2 篇 tian tian
  • 2 篇 jianwei jia
  • 1 篇 武金木
  • 1 篇 王大庆

语言

  • 76 篇 英文
  • 5 篇 中文
检索条件"主题词=Cryptanalysis"
81 条 记 录,以下是1-10 订阅
排序:
A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers
收藏 引用
Computer Systems Science & Engineering 2021年 第10期39卷 87-106页
作者: Arkan Kh Shakr Sabonchi Bahriye Akay Computer Engineering Department Erciyes UniversityKayseri38039MelikgaziTurkey
This paper presents state-of-art Cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms.Traditional Cryptanalysis methods employ an exhaustive search,whic... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem
收藏 引用
Tsinghua Science and Technology 2018年 第6期23卷 671-679页
作者: Jaihui Chen Chik How Tan Xiaoyu Li School of Computer Guangdong University of Technology Guangzhou 510006 China Temasek Laboratories NationalUniversity of Singapore Singapore 117411 Singapore the School of Computer Zhengzhou University of Aeronautics Zhengzhou 450046 China
Multivariate Public Key Cryptography (MPKC) has intensively and rapidly developed during the past three decades. MPKC is a promising candidate for post-quantum cryptography. However, designing it is universally rega... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 133-143页
作者: Jinhui LIU Huanguo ZHANG Jianwei JIA Houzhen WANG Shaowu MAO Wanqing WU Computer School of Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC,and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now,no quantum ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition
收藏 引用
Chinese Journal of Electronics 2017年 第6期26卷 1139-1146页
作者: LIU Jinhui ZHANG Huanguo JIA Jianwei Computer School of Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad
收藏 引用
Chinese Physics B 2016年 第8期25卷 59-64页
作者: 刘志昊 陈汉武 School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Center for Quantum Computation and Intelligent Systems Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security iss... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of full PRIDE block cipher
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 169-180页
作者: Yibin DAI Shaozhen CHEN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 947-951页
作者: JIA Jianwei LIU Jinhui ZHANG Huanguo Computer School of Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of an MOR cryptosystem based on a finite associative algebra
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 137-145页
作者: Wanqing WU Huanguo ZHANG Houzhen WANG Shaowu MAO Shuomei WU Haiqing HAN Computer School of Wuhan University Computer Department Shijiazhuang University School of Mathematics and Physics Hubei Polytechnic University
The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYPTO 2001, Paeng(2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candidate sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Generalized Cryptanalysis of RSA with small public exponent
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 97-106页
作者: Mengce ZHENG Honggang HU Zilong WANG Key Laboratory of Electromagnetic Space Information Chinese Academy of Sciences (CAS) School of Information Science and Technology University of Science and Technology of China
In this paper, we demonstrate that there exist weak keys in the RSA public-key cryptosystem with the public exponent e = N;N;. In 1999, Boneh and Durfee showed that when α≈ 1 and the private exponent d = N;< N;, the... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of Prime Power RSA with two private exponents
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 59-66页
作者: ZHENG MengCe HU HongGang Key Laboratory of Electromagnetic Space Information Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China
In this paper, we consider a variant of RSA schemes called Prime Power RSA with modulus N= prq for r 2, where p, q are of the same bit-size. May showed that when private exponent d 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论