咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 电气工程
    • 4 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
  • 2 篇 理学
    • 2 篇 数学

主题

  • 5 篇 key exchange pro...
  • 3 篇 cryptography
  • 2 篇 cryptanalysis
  • 1 篇 secure communica...
  • 1 篇 lattices
  • 1 篇 one-round
  • 1 篇 general construc...
  • 1 篇 smart card
  • 1 篇 linear equations
  • 1 篇 password
  • 1 篇 post-quantum com...
  • 1 篇 small integer so...
  • 1 篇 provable secure
  • 1 篇 discrete logarit...
  • 1 篇 strong forward s...
  • 1 篇 matrix decomposi...
  • 1 篇 certificateless

机构

  • 1 篇 key laboratory o...
  • 1 篇 department of ma...
  • 1 篇 national compute...
  • 1 篇 department of co...
  • 1 篇 national compute...
  • 1 篇 computer school ...
  • 1 篇 school of comput...
  • 1 篇 school of mathem...
  • 1 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 state key labora...

作者

  • 2 篇 liu jinhui
  • 2 篇 zhang huanguo
  • 2 篇 jia jianwei
  • 1 篇 zhang yuqing
  • 1 篇 yuqing zhang
  • 1 篇 feng rongquan
  • 1 篇 wang shanbiao
  • 1 篇 fan dan
  • 1 篇 li xiaowei
  • 1 篇 zhu yan
  • 1 篇 ma di
  • 1 篇 zhang gefei
  • 1 篇 xiaowei li
  • 1 篇 dengqi yang
  • 1 篇 benhui chen

语言

  • 5 篇 英文
检索条件"主题词=Key exchange protocol"
5 条 记 录,以下是1-10 订阅
排序:
Cryptanalysis of a key exchange protocol Based on Commuting Matrices
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 947-951页
作者: JIA Jianwei LIU Jinhui ZHANG Huanguo Computer School of Wuhan University key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CLORKE-SFS:Certificateless One-Round key exchange protocol with Strong Forward Security in Limited Communication Scenarios
收藏 引用
China Communications 2021年 第7期18卷 211-222页
作者: Xiaowei Li Dengqi Yang Benhui Chen Yuqing Zhang Department of Mathematics and Computer Science Dali UniversityDali 671003China National Computer Network Intrusion Protection Center University of the Chinese Academy of SciencesBeijing 100049China
Certificateless one-round key exchange(CL-ORKE)protocols enable each participant to share a common key with only one round of communication which greatly saves communication cost.CLORKE protocols can be applied to sce... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Provably Secure General Construction for key exchange protocols Using Smart Card and Password
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 271-278页
作者: ZHANG Gefei FAN Dan ZHANG Yuqing LI Xiaowei National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password.Most of these protocols are often li... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Lattice-based key exchange on small integer solution problem
收藏 引用
Science China(Information Sciences) 2014年 第11期57卷 150-161页
作者: WANG ShanBiao ZHU Yan MA Di FENG RongQuan School of Mathematical Sciences Peking University School of Computer and Communication Engineering University of Science and Technology Beijing Department of Computer and Information Science University of Michigan-Dearborn
In this paper, we propose a new hard problem, called bilateral inhomogeneous small integer solution(Bi-ISIS), which can be seen as an extension of the small integer solution problem on lattices. The main idea is that,... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第3期21卷 209-213页
作者: LIU Jinhui ZHANG Huanguo JIA Jianwei School of Computer Wuhan University Wuhan 430072Hubei China key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 Hubei China
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论