咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 14 篇 网络空间安全
    • 12 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
  • 7 篇 理学
    • 7 篇 数学
  • 6 篇 军事学
    • 6 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 26 篇 discrete logarit...
  • 5 篇 threshold scheme
  • 4 篇 digital signatur...
  • 3 篇 elliptic curve
  • 3 篇 finite field
  • 3 篇 cryptosystem
  • 2 篇 square root
  • 2 篇 hyperelliptic cu...
  • 2 篇 multiple secret ...
  • 2 篇 cryptography
  • 2 篇 secret sharing
  • 2 篇 threshold digita...
  • 2 篇 factoring
  • 2 篇 genus
  • 1 篇 homomorphic mess...
  • 1 篇 elliptic curve a...
  • 1 篇 seeret shadow
  • 1 篇 cheating
  • 1 篇 ecdsa
  • 1 篇 quadratic residu...

机构

  • 2 篇 燕山大学
  • 1 篇 academy of mathe...
  • 1 篇 school of comput...
  • 1 篇 department of ma...
  • 1 篇 department of ma...
  • 1 篇 school of comput...
  • 1 篇 department of ma...
  • 1 篇 national key lab...
  • 1 篇 beijing key labo...
  • 1 篇 school of mathem...
  • 1 篇 college of mathe...
  • 1 篇 school of comput...
  • 1 篇 the national key...
  • 1 篇 school of life s...
  • 1 篇 school of comput...
  • 1 篇 lifescienceinsti...
  • 1 篇 fourth military ...
  • 1 篇 department of ma...
  • 1 篇 information scie...
  • 1 篇 department of in...

作者

  • 2 篇 wang yumin
  • 2 篇 崔哲
  • 2 篇 zhan tao
  • 2 篇 wang mingqiang
  • 2 篇 xue haiyang
  • 2 篇 余梅生
  • 1 篇 jun quan li mu l...
  • 1 篇 liu duo tan zhiy...
  • 1 篇 罗平
  • 1 篇 li zhuo
  • 1 篇 tuan nguyen kim
  • 1 篇 eddie shahril is...
  • 1 篇 department of in...
  • 1 篇 chenyanpu
  • 1 篇 叶顶峰
  • 1 篇 fei ru-chun 1 2 ...
  • 1 篇 戴瑞恩
  • 1 篇 陈小平
  • 1 篇 liang zhang
  • 1 篇 裴定一

语言

  • 23 篇 英文
  • 3 篇 中文
检索条件"主题词=Discrete logarithm"
26 条 记 录,以下是1-10 订阅
排序:
Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
收藏 引用
Science China(Information Sciences) 2014年 第3期57卷 187-203页
作者: WANG MingQiang XUE HaiYang ZHAN Tao School of Mathematics Shandong University
In this paper,we present invalid-curve attacks that apply to the hyperelliptic curve scalar multiplication(HECSM)algorithm proposed by Avanzi et *** the genus 2 hyperelliptic curve over binary *** observe some new pro... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Solving the Multi-discrete logarithm Problems over a Group of Elliptic Curves with Prime Order
收藏 引用
Acta Mathematica Sinica,English Series 2005年 第6期21卷 1443-1450页
作者: Jun Quan LI Mu Lan LIU Liang Liang XIAO Academy of Mathematics and Systems Science Key Laboratory of Mathematics Mechanization Chinese Academy of Sciences Beijing 100080 P. R. China
In this paper, we discuss the expected number of steps in solving multi-discrete logarithm problems over a group of elliptic curves with prime order by using Pollard's rho method and parallel collision search algorit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold Signature Scheme Based on discrete logarithm and Quadratic Residue
收藏 引用
Wuhan University Journal of Natural Sciences 2004年 第5期9卷 770-774页
作者: FEI Ru-chun 1,2 , WANG Li-na 1 1.School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2.Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China School of Computer Wuhan University Wuhan Hubei China Department of Information Engineering Benxi College of Metallurgy Benxi Liaoning China
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The discrete logarithm problem from a local duality perspective
收藏 引用
Science China Mathematics 2013年 第7期56卷 1421-1427页
作者: HUANG MingDeh Department of Computer Science University of Southern CaliforniaLos AngelesCA 90089-0781 USA
The discrete logarithm problem is analyzed from the perspective of Tate local duality. Local duality in the multiplicative case and the case of Jacobians of curves over p-adic local fields are considered. When the loc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Security Analysis of discrete logarithm Based Cryptosystems
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1715-1717页
作者: WANG Yuzhu LIAO Xiaofeng School of Computer Chongqing University Chongqing 400030 China
discrete logarithm based cryptosysterns have subtle problems that make the schemes vulnerable. This paper gives a comprehensive listing of security issues in the systems and analyzes three classes of attacks which are... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fault Attacks on Hyperelliptic Curve discrete logarithm Problem over Finite Fields
收藏 引用
China Communications 2012年 第11期9卷 150-161页
作者: Wang Mingqiang Xue Haiyang Zhan Tao School of Mathematics Shandong University Jinan 250100 P. R. China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100864. P. R. China
In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Forgery Attacks on Wang's Signature Schemes Based on Factoring and discrete logarithm
收藏 引用
Journal of Systems Science and Information 2009年 第1期7卷 43-48页
作者: Dezhi Gao Xiangqian Liang Information Science and Engineering College Shandong University of Science and TechnologyQingdao 266510 Shandong China
To enhance the security of signature schemes, Wang proposed two signature schemes based on the difficulties of simultaneously solving the factoring and discrete logarithm' problems with almost the same sizes of arith... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Threshold Signature Scheme Based on discrete logarithm and Quadratic Residue
Threshold Signature Scheme Based on Discrete Logarithm and Q...
收藏 引用
The First Conference on Web Information System and Applications
作者: FEI Ru-chun, WANG Li-na School of Computer, Wuhan University, Wuhan 430072, Hubei, China Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China
<正> Digital signature scheme is a very important research field in computer security and modern cryptography. A (k,n) threshold digital signature scheme is proposed by integrating digital signature scheme with Sh... 详细信息
来源: cnki会议 评论
Reducing discrete logarithm Problem of Conic Curve Over GF(2n) to discrete logarithm Problem of Finite Field
Reducing Discrete Logarithm Problem of Conic Curve Over GF(2...
收藏 引用
第十二届全国青年通信学术会议
作者: Liu Duo Tan Zhiyong Dai Yiqi Department of Computer Science and Technology,Tsinghua University,Beijing,100084,Peoples Republic of China
The isomorphism from conic curve C over GF(2)to a subgroup of GF(2) is presented. Therefore it conclude that the security of cryptosystems base on the C over GF(2)is no stronger than those based on the multiplicative ... 详细信息
来源: cnki会议 评论
Weak-Keys in Public Key Cryptosystems Based on discrete logarithms
收藏 引用
Tsinghua Science and Technology 2005年 第5期10卷 579-581页
作者: 戴瑞恩 罗平 彭小宁 王道顺 Department of Computer Science and Technology Tsinghua University Beijing 100084 China Department of Computer Science and Technology Huaihua University Huaihua 418008 China
The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论