咨询与建议

限定检索结果

文献类型

  • 433 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 176 篇 网络空间安全
    • 119 篇 计算机科学与技术...
    • 40 篇 电子科学与技术(可...
    • 28 篇 软件工程
    • 25 篇 信息与通信工程
    • 19 篇 仪器科学与技术
    • 16 篇 控制科学与工程
    • 14 篇 机械工程
    • 7 篇 光学工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 电气工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
  • 206 篇 理学
    • 110 篇 物理学
    • 99 篇 数学
    • 3 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地球物理学
  • 112 篇 军事学
    • 112 篇 军队指挥学
  • 24 篇 管理学
    • 22 篇 管理科学与工程(可...
  • 6 篇 艺术学
    • 6 篇 设计学(可授艺术学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 医学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 农学

主题

  • 100 篇 cryptography
  • 26 篇 quantum cryptogr...
  • 26 篇 quantum
  • 17 篇 cryptanalysis
  • 14 篇 key
  • 14 篇 blockchain
  • 14 篇 information secu...
  • 11 篇 security
  • 11 篇 quantum key dist...
  • 10 篇 block cipher
  • 9 篇 boolean function...
  • 9 篇 post-quantum cry...
  • 9 篇 attack
  • 9 篇 encryption
  • 8 篇 distribution
  • 8 篇 provable securit...
  • 7 篇 standard model
  • 7 篇 data security
  • 7 篇 identity-based c...
  • 6 篇 elliptic curve

机构

  • 25 篇 state key labora...
  • 18 篇 state key labora...
  • 12 篇 key laboratory o...
  • 11 篇 university of ch...
  • 10 篇 school of cyber ...
  • 9 篇 state key labora...
  • 8 篇 synergetic innov...
  • 7 篇 trusted computin...
  • 7 篇 department of co...
  • 6 篇 henan key labora...
  • 6 篇 data assurance a...
  • 6 篇 henan key labora...
  • 6 篇 school of cybers...
  • 6 篇 information secu...
  • 6 篇 state key labora...
  • 6 篇 institute for ad...
  • 5 篇 state key labora...
  • 5 篇 state key labora...
  • 5 篇 henan key labora...
  • 5 篇 synergetic innov...

作者

  • 13 篇 wan-su bao
  • 10 篇 yang wang
  • 9 篇 温巧燕
  • 9 篇 鲍皖苏
  • 9 篇 hu yupu
  • 9 篇 huanguo zhang
  • 8 篇 lin dongdai
  • 8 篇 李宏伟
  • 7 篇 周淳
  • 7 篇 江木生
  • 7 篇 wen qiaoyan
  • 6 篇 yiliang han
  • 6 篇 meiqin wang
  • 6 篇 zhang huanguo
  • 6 篇 he-liang huang
  • 6 篇 汪洋
  • 6 篇 xiaoyun wang
  • 5 篇 xiu-bo chen
  • 5 篇 zhu fuchen
  • 5 篇 陈秀波

语言

  • 411 篇 英文
  • 28 篇 中文
检索条件"机构=Al-Kindi Cryptography Research Laboratory"
439 条 记 录,以下是331-340 订阅
排序:
Survey on Quantum Information Security
收藏 引用
China Communications 2019年 第10期16卷 1-36页
作者: Huanguo Zhang Zhaoxu Ji Houzhen Wang Wanqing Wu Key laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Cyber Security and Computer Hebei UniversityBaoding 071002China
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which off... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A quantum encryption scheme using d-level systems
收藏 引用
Chinese Physics B 2006年 第8期15卷 1690-1694页
作者: 郭奋卓 高飞 温巧燕 朱甫臣 School of Science Beijing University of Posts and Telecommunications Beijing 100876 China State Key laboratory of Integrated Services Network Xidian University Xi'an 710071 China National laboratory for Modern Communications P.O. Box 810 Chengdu 610041 China
Using the generalized Bell states and quantum gates, we introduce a quantum encryption scheme of d-level states (qudits). The scheme can detect and correct arbitrary transmission errors using only local operations a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New automatic tool for finding impossible differentials and zero-correlation linear approximations
收藏 引用
Science China(Information Sciences) 2021年 第2期64卷 246-248页
作者: Tingting CUI Shiyao CHEN Kai FU Meiqin WANG Keting JIA School of Cyberspace Hangzhou Dianzi University Key laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University China Academy of Information and Communications Technology Department of Computer Science and Technology Tsinghua University
Dear editor,Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two powerful methods in the block cipher field. Herein, we present an automatic tool to find impossible differentials(IDs... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quantum Secret Sharing Protocols with High Efficiency
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 117-120页
作者: GAO Fei WEN Qiaoyan ZHU Fuchen School of Science Beijing University of Posts andTelecommunications Beijing 100876 China National laboratory for Modern Communications Chengdu 610041 Sichuan China
Measuring the two photons from a Bell state will yield certain correlations between the measurement results. Based on this feature, two quantum secret sharing protocols were proposed. The security against several gene... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Adaptively secure hierarchical identity-based signature in the standard model
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第6期17卷 95-100页
作者: ZHANG Le-you HU Yu-pu WU Qing Department of Mathematics Science Xidian University Xi'an 710071 China Key laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China School of Automation Xi'an Institute of Posts and Telecommunications Xi'an 710121 China
Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Server-aided immediate and robust user revocation mechanism for SM9
收藏 引用
Cybersecurity 2020年 第1期3卷 190-202页
作者: Shuzhou Sun Hui Ma Rui Zhang Wenhan Xu State Key laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China.
As the only approved Identity-Based Encryption scheme in China that is also standardized by ISO,SM9-IBE has been widely adopted in many real-world ***,similar to other IBE standard algorithms,SM9-IBE currently lacks r... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cascaded liquid crystal holography for optical encryption
收藏 引用
Chinese Optics Letters 2023年 第12期21卷 11-18页
作者: 王泽宇 张涵 刘筱姮 窦韵洁 段薇 陈伟 马玲玲 陆延青 National laboratory of Solid State Microstructures Key Laboratory of Intelligent Optical Sensing and ManipulationCollaborative Innovation Center of Advanced Microstructuresand College of Engineering and Applied SciencesNanjing UniversityNanjing 210023China School of Instrumentation and Optoelectronic Engineering Beihang UniversityBeijing 100191China
Cascaded holography coupled with the secret-sharing scheme has recently gained considerable attention due to its enhanced information processing and encryption ***,we propose a new holographic iterative algorithm and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A lattice-based signcryption scheme without random oracles
收藏 引用
Frontiers of Computer Science 2014年 第4期8卷 667-675页
作者: Xiuhua LU Qiaoyan WEN Zhengping JIN Licheng WANG Chunli YANG State Key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Mathematics and Information Science Langfang Teachers University Langfang 065000 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Inf... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第3期21卷 209-213页
作者: LIU Jinhui ZHANG Huanguo JIA Jianwei School of Computer Wuhan University Wuhan 430072Hubei China Key laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 Hubei China
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Data Security and Privacy in Bitcoin System:A Survey
收藏 引用
Journal of Computer Science & Technology 2020年 第4期35卷 843-862页
作者: Lie-Huang Zhu Bao-Kun Zheng Meng Shen Feng Gao Hong-Yu Li Ke-Xin Shi School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Information Management for Law China University of Political Science and LawBeijing 102249China Key laboratory of Information Network Security Ministry of Public SecurityShanghai 201204China
To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and *** is an electronic payment system based on cryptography rather than on... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论