咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 11 篇 计算机科学与技术...
    • 10 篇 网络空间安全
    • 4 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 生物工程
  • 8 篇 理学
    • 6 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
  • 6 篇 军事学
    • 6 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 25 篇 cryptology
  • 7 篇 information secu...
  • 3 篇 elliptic curve
  • 3 篇 frobenius
  • 3 篇 cryptanalysis
  • 3 篇 network security
  • 3 篇 optimal extensio...
  • 2 篇 evolutionary cry...
  • 2 篇 quantum computin...
  • 2 篇 key distribution...
  • 2 篇 differential cry...
  • 2 篇 cryptosystem
  • 2 篇 algorithm
  • 1 篇 exponentiation
  • 1 篇 information hidi...
  • 1 篇 data security
  • 1 篇 distinguishing a...
  • 1 篇 ,
  • 1 篇 additionsequence
  • 1 篇 achterbahn

机构

  • 1 篇 department of co...
  • 1 篇 school of cyber ...
  • 1 篇 1. the key labor...
  • 1 篇 information secu...
  • 1 篇 coll. of info. s...
  • 1 篇 state key labora...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 school of mathem...
  • 1 篇 department of co...
  • 1 篇 1. school of com...
  • 1 篇 infor
  • 1 篇 department of co...
  • 1 篇 uest of china ch...
  • 1 篇 1. school of com...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 school of mathem...
  • 1 篇 department of co...

作者

  • 2 篇 zhang huanguo
  • 2 篇 wang yahui
  • 1 篇 汪为农
  • 1 篇 4national engine...
  • 1 篇 huang jiwu
  • 1 篇 yang yi-xian niu...
  • 1 篇 yangyi-xian
  • 1 篇 muhammad abu bak...
  • 1 篇 liu duo tan zhiy...
  • 1 篇 罗平
  • 1 篇 zhang huangguo
  • 1 篇 liu duo. dai yi-...
  • 1 篇 chen yun(uest of...
  • 1 篇 li fu-lin
  • 1 篇 r. m. chandrasek...
  • 1 篇 zhang huanguo 1 ...
  • 1 篇 zhan banghua and...
  • 1 篇 2 key laboratory...
  • 1 篇 2 key laboratory...
  • 1 篇 zhang huanguo 1 ...

语言

  • 25 篇 英文
检索条件"主题词=cryptology"
25 条 记 录,以下是1-10 订阅
排序:
An Innovative Approach Using TKN-cryptology for Identifying the Replay Assault
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Progress and Prospect of Some Fundamental Research on Information Security in China
收藏 引用
Journal of Computer Science & Technology 2006年 第5期21卷 740-755页
作者: 冯登国 王小云 State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 P.R. China School of Mathematics and System Science Shandong University Jinan 250100 P.R. China
With the development of network and information technologies, information security is more and more widely researched in China. To know where the work is and where it goes, we focus on comprehensively surveying the tw... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cryptanalysis of Achterbahn-Version 1 and-Version 2
收藏 引用
Journal of Computer Science & Technology 2007年 第3期22卷 469-475页
作者: 黄小莉 武传坤 The State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences
Achterbahn is one of the candidate stream ciphers submitted to the eSTREAM, which is the ECRYPT Stream Cipher Project. The cipher Achterbahn uses a new structure which is based on several nonlinear feedback shift regi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 126-135页
作者: FANG XiWen LAI XueJia Department of Computer Science and Engineering Shanghai Jiao Tong University
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption *** our scheme,new users can join dynamically without modification of other users’decryption *** the ciphertext or the decryption key is ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Computing the k-error joint linear complexity of binary periodic multisequences
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第6期20卷 96-101页
作者: LI Fu-lin ZHU Shi-xin School of Mathematics Hefei University of Technology
Complexity measures for multisequences over finite fields, such as the joint linear complexity and the k-error joint linear complexity, play an important role in cryptology. In this paper we study a fast algorithm, pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Differential Attack on Five Rounds of the SC2000 Block Cipher
收藏 引用
Journal of Computer Science & Technology 2011年 第4期26卷 722-731页
作者: 吕继强 Department of Computer Science Ecole Normale Superieure45 Rue d'Ulm
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128-bit user key is used. It is a CRYPTREC recommended e-government cipher in Japan. In... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography against multidimensional linear cryptanalysis
收藏 引用
Science China(Information Sciences) 2011年 第12期54卷 2585-2597页
作者: ZHANG HuanGuo 1,2 , LI ChunLei 1,2 & TANG Ming 1,2 1 School of Computer, Wuhan University, Wuhan 430079, China 2 Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education of China, Wuhan University, Wuhan 430079, China 1. School of Computer Wuhan University Wuhan 430079 China2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education of China Wuhan University Wuhan 430079 China
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Design theory and method of multivariate hash function
收藏 引用
Science China(Information Sciences) 2010年 第10期53卷 1977-1987页
作者: WANG HouZhen 1,2 , ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer, Wuhan University, Wuhan 430072, China 2 Key Laboratory of Mathematics Mechanization, Beijing 100080, China 1. The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan 430072 China2. Key Laboratory of Mathematics Mechanization Beijing 100080 China
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Asymmetric encryption and signature method with DNA technology
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 506-514页
作者: LAI XueJia1, LU MingXin2, QIN Lei3, HAN JunSong4 & FANG XiWen11Department of Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai 200030, China 2School of National Information Security, Nanjing University, Nanjing 210093, China 3BIOCOMPLEX, 4915 Bathurst St. Unit# 209-366, ON M2R 1X9, Canada 4National Engineering Center for BioChip at Shanghai, Shanghai 201203, China 1. Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200030 China2. School of National Information Security Nanjing University Nanjing 210093 China3. BIOCOMPLEX 4915 Bathurst St. Unit# 209-366 Toronto ON M2R 1X9 Canada4. National Engineering Center for BioChip at Shanghai Shanghai 201203 China
This paper proposes DNA-PKC, an asymmetric encryption and signature cryptosystem by combining the technologies of genetic engineering and cryptology. It is an exploratory research of biological cryptology. Similar to ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Survey of information security
收藏 引用
Science in China(Series F) 2007年 第3期50卷 273-298页
作者: SHEN ChangXiang ZHANG HuangGuo FENG DengGuo CAO ZhenFu HUANG JiWu Computing Technology Institute of China Navy Beijing 100841 China School of Computer Wuhan University Wuhan 430072 China Institute of Software Chinese Academy of Sciences Beijing 100080 China Department of Computer Science and Technology Shanghai Jiaotong University Shanghai 200030China Information Technology Institute Zhongshan University Guangzhou 510275 China
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论