咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 7 篇 网络空间安全
    • 6 篇 计算机科学与技术...
    • 2 篇 电子科学与技术(可...
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 4 篇 理学
    • 4 篇 数学
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 17 篇 public key crypt...
  • 2 篇 invertibility
  • 2 篇 finite automata
  • 1 篇 standard model
  • 1 篇 q)
  • 1 篇 key escrow schem...
  • 1 篇 elliptic curve
  • 1 篇 chosen ciphertex...
  • 1 篇 data security
  • 1 篇 quantum computin...
  • 1 篇 rsa cryptosystem
  • 1 篇 very large scale...
  • 1 篇 artin group
  • 1 篇 quadratic field ...
  • 1 篇 multiplication
  • 1 篇 special-purpose ...
  • 1 篇 exotic semirings
  • 1 篇 quadratic fields
  • 1 篇 network access
  • 1 篇 threshold crypto...

机构

  • 1 篇 state key labora...
  • 1 篇 institute of mic...
  • 1 篇 rmit univ melbou...
  • 1 篇 laboratoryforcom...
  • 1 篇 college of infor...
  • 1 篇 laboratoryforcom...
  • 1 篇 dept. of compute...
  • 1 篇 school of inform...
  • 1 篇 the state key la...
  • 1 篇 faculty of appli...
  • 1 篇 department of ma...
  • 1 篇 college of compu...
  • 1 篇 t hamburg hambur...
  • 1 篇 college of compu...
  • 1 篇 dept. of compute...
  • 1 篇 school of commun...
  • 1 篇 univ birmingham ...
  • 1 篇 information and ...
  • 1 篇 department of ma...
  • 1 篇 dept. of compute...

作者

  • 1 篇 吴行军
  • 1 篇 yao xin
  • 1 篇 陈弘毅
  • 1 篇 王弈
  • 1 篇 shaowu mao
  • 1 篇 wang baocang
  • 1 篇 cheng zhang
  • 1 篇 weidong zhong
  • 1 篇 yiliang han
  • 1 篇 zhen liu
  • 1 篇 陈新
  • 1 篇 benjamin fine
  • 1 篇 liqiang zhang
  • 1 篇 白国强
  • 1 篇 hu yupu
  • 1 篇 曹珍富
  • 1 篇 胡磊
  • 1 篇 wanqing wu
  • 1 篇 白英彩
  • 1 篇 huanguo zhang

语言

  • 17 篇 英文
检索条件"主题词=public key cryptosystem"
17 条 记 录,以下是1-10 订阅
排序:
A threshold key escrow scheme based on public key cryptosystem
收藏 引用
Science China(Technological Sciences) 2001年 第4期44卷 441-448页
作者: 曹珍富 Department of Mathematics Harbin Institute of Technology Harbin China
In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no bet... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient and Practical public key cryptosystem with CCA-Security on Standard Model
收藏 引用
Tsinghua Science and Technology 2014年 第5期19卷 486-495页
作者: Zhen Liu Xiaoyuan Yang Weidong Zhong Yiliang Han Department of Network and Information Security key Laboratory Engineering University of the Armed PoliceForce
Chosen Ciphertext Attack (CCA) security on the standard model is widely accepted as the standard security notion for the public key cryptosystem. The existing CCA-secure public key cryptosystems on the standard mode... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
public key cryptosystem Based on Two Sided Action of Different Exotic Semirings
收藏 引用
Journal of Mathematics and System Science 2014年 第1期4卷 6-13页
作者: Mariana Durcheva Faculty of Applied Mathematics and Informatics Technical University of Sofia Sofia 1756 Bulgaria
The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic prob... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New public-key cryptosystem Based on the Morphism of Polynomials Problem
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 302-311页
作者: Houzhen Wang Huanguo Zhang Shaowu Mao Wanqing Wu Liqiang Zhang Computer School of Wuhan University Wuhan 430079China the State key Laboratory of Cryptology Beijing 100878China
During the last two decades, there has been intensive and fast development in Multivariate public key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
New public key cryptosystems from Combinatorial Group Theory
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第5期11卷 1267-1270页
作者: TANG Xueming WANG Xiaofei HONG Fan CUI Guohua College of Computer Science and Technology HuazhongUniversity of Science and Technology Wuhan 430074Hubei China
External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Constructing Finite Automata with Invertibility bytransformation Method
收藏 引用
Journal of Computer Science & Technology 2000年 第1期15卷 10-26页
作者: 陶仁骥 陈世华 LaboratoryforComputerScience InstituteofSoftwareChineseAcademyofSciencesP.O.Box8718Beijing100080P.R.China LaboratoryforComputerScience InstituteofSoftwareChineseAcademyofScienc
Ra, Rb transformations were successfully applied to establish invertibility theory for linear and quasi-linear finite automata over finite fields. In aprevious paper, the authors generalized R., Rb transformations to ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
New designing of cryptosystems based on quadratic fields
收藏 引用
Science in China(Series F) 2008年 第8期51卷 1106-1116页
作者: DONG XiaoLei CAO ZhenFu WANG LiCheng Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
This paper proposes a method to construct new kind of non-maximal imaginary quadratic order (NIQO*) by combining the technique of Diophantine equation and the characters of non-maximal imaginary quadratic order. It... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
public key based uniform access framework in 3G systems
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2006年 第4期13卷 404-408页
作者: 王弈 谷大武 白英彩 Dept. of Computer Science and Engineering Shanghai Jiaotong University
This paper compares two types of access methods in 3G telecommunication systems, registration based access method and alternative access method. Through analyzing their common ground, we establish a public-key based u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fast VLSI Implementation of Modular Inversion in Galois Field GF(p)
收藏 引用
Tsinghua Science and Technology 2003年 第5期8卷 628-632页
作者: 周涛 吴行军 白国强 陈弘毅 Institute of Microelectronics
Modular inversion is one of the key arithmetic operations in public key cryptosystems, so low-cost, high-speed hardware implementation is absolutely necessary. This paper presents an algorithm for prime fields for ha... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
New Weak keys in RSA
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1529-1532页
作者: WANG Baocang LIU Shuanggen HU Yupu key Laboratory of Computer Network and Information Security Ministry of Edueation Xidian University Xi'an 710071 Shaanxi China College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 Jiangxi China
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论