咨询与建议

限定检索结果

文献类型

  • 76 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67 篇 工学
    • 44 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 28 篇 网络空间安全
    • 27 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 9 篇 材料科学与工程(可...
    • 6 篇 软件工程
    • 2 篇 机械工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 42 篇 理学
    • 31 篇 数学
    • 11 篇 物理学
    • 6 篇 天文学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 5 篇 图书情报与档案管...
  • 4 篇 医学
    • 4 篇 临床医学

主题

  • 81 篇 cryptanalysis
  • 15 篇 cryptography
  • 8 篇 stream cipher
  • 6 篇 block cipher
  • 5 篇 rsa
  • 4 篇 cipher
  • 4 篇 fault attack
  • 4 篇 block
  • 4 篇 encryption
  • 3 篇 lll algorithm
  • 3 篇 image encryption
  • 3 篇 post-quantum com...
  • 3 篇 attack
  • 3 篇 quantum
  • 3 篇 information secu...
  • 3 篇 security
  • 3 篇 lattice basis re...
  • 3 篇 cryptology
  • 3 篇 chaos
  • 3 篇 differential

机构

  • 4 篇 computer school ...
  • 3 篇 key laboratory o...
  • 2 篇 shandong univers...
  • 2 篇 tsinghua nationa...
  • 2 篇 school of scienc...
  • 2 篇 school of softwa...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 graduate univers...
  • 2 篇 zhengzhou inform...
  • 2 篇 institute for ad...
  • 1 篇 school of manage...
  • 1 篇 college of compu...
  • 1 篇 state key lab. o...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...
  • 1 篇 dept.of computer...
  • 1 篇 department of in...
  • 1 篇 department of co...

作者

  • 4 篇 zhang huanguo
  • 3 篇 shaowu mao
  • 3 篇 houzhen wang
  • 3 篇 liu jinhui
  • 3 篇 李大兴
  • 3 篇 huanguo zhang
  • 3 篇 jia jianwei
  • 2 篇 ma zhen
  • 2 篇 dawu gu
  • 2 篇 wanqing wu
  • 2 篇 jinhui liu
  • 2 篇 qi wenfeng
  • 2 篇 李大为
  • 2 篇 王兴元
  • 2 篇 wang yan
  • 2 篇 hu yu-pu
  • 2 篇 tian tian
  • 2 篇 jianwei jia
  • 1 篇 武金木
  • 1 篇 王大庆

语言

  • 76 篇 英文
  • 5 篇 中文
检索条件"主题词=cryptanalysis"
81 条 记 录,以下是1-10 订阅
排序:
cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
收藏 引用
Computer Systems Science & Engineering 2023年 第8期46卷 2401-2414页
作者: Mohammed S.Alshehri Sultan Almakdi Mimonah Al Qathrady Jawad Ahmad Department of Computer Science Najran UniversityNajran55461Saudi Arabia Department of Information Systems Najran UniversityNajran55461Saudi Arabia School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 133-143页
作者: Jinhui LIU Huanguo ZHANG Jianwei JIA Houzhen WANG Shaowu MAO Wanqing WU Computer School of Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC,and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now,no quantum ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad
收藏 引用
Chinese Physics B 2016年 第8期25卷 59-64页
作者: 刘志昊 陈汉武 School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Center for Quantum Computation and Intelligent Systems Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security iss... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
cryptanalysis of a Type of CRT-Based RSA Algorithms
收藏 引用
Journal of Computer Science & Technology 2008年 第2期23卷 214-221页
作者: 秦宝东 李明 孔凡玉 College of Computer Science and Technology Southwest University of Science and TechnologyMianyang 621010China Institute of Network Security Shandong UniversityJinan 250100China Key Laboratory of Cryptographic Technology and Information SecurityJinan 250100China
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
cryptanalysis of Achterbahn-Version 1 and-Version 2
收藏 引用
Journal of Computer Science & Technology 2007年 第3期22卷 469-475页
作者: 黄小莉 武传坤 The State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences
Achterbahn is one of the candidate stream ciphers submitted to the eSTREAM, which is the ECRYPT Stream Cipher Project. The cipher Achterbahn uses a new structure which is based on several nonlinear feedback shift regi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
cryptanalysis of an MOR cryptosystem based on a finite associative algebra
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 137-145页
作者: Wanqing WU Huanguo ZHANG Houzhen WANG Shaowu MAO Shuomei WU Haiqing HAN Computer School of Wuhan University Computer Department Shijiazhuang University School of Mathematics and Physics Hubei Polytechnic University
The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYPTO 2001, Paeng(2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candidate sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
cryptanalysis and improvement of a digital image encryption method with chaotic map lattices
收藏 引用
Chinese Physics B 2013年 第5期22卷 198-202页
作者: 王兴元 刘林涛 Faculty of Electronic Information and Electrical Engineering Dalian University of Technology
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recove... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
cryptanalysis of an ergodic chaotic encryption algorithm
收藏 引用
Chinese Physics B 2012年 第4期21卷 159-165页
作者: 王兴元 谢旖欣 秦学 Faculty of Electronic Information and Electrical Engineering Dalian University of TechnologyDalian 116024China
In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
cryptanalysis of Prime Power RSA with two private exponents
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 59-66页
作者: ZHENG MengCe HU HongGang Key Laboratory of Electromagnetic Space Information Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China
In this paper, we consider a variant of RSA schemes called Prime Power RSA with modulus N= prq for r 2, where p, q are of the same bit-size. May showed that when private exponent d 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
cryptanalysis of full PRIDE block cipher
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 169-180页
作者: Yibin DAI Shaozhen CHEN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论