咨询与建议

限定检索结果

文献类型

  • 162 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 164 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 123 篇 工学
    • 64 篇 网络空间安全
    • 51 篇 计算机科学与技术...
    • 15 篇 电子科学与技术(可...
    • 14 篇 控制科学与工程
    • 13 篇 软件工程
    • 9 篇 机械工程
    • 9 篇 仪器科学与技术
    • 8 篇 信息与通信工程
    • 2 篇 轻工技术与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 测绘科学与技术
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 安全科学与工程
  • 63 篇 理学
    • 38 篇 数学
    • 25 篇 物理学
    • 1 篇 地球物理学
  • 44 篇 军事学
    • 44 篇 军队指挥学
  • 15 篇 管理学
    • 15 篇 管理科学与工程(可...
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
    • 1 篇 美术学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 10 篇 cryptography
  • 6 篇 quantum
  • 5 篇 quantum algorith...
  • 5 篇 ciphers
  • 5 篇 block cipher
  • 5 篇 stream cipher
  • 4 篇 standard model
  • 4 篇 homomorphic encr...
  • 4 篇 privacy protecti...
  • 4 篇 lightweight
  • 4 篇 security
  • 4 篇 encryption
  • 4 篇 provable securit...
  • 3 篇 boolean function...
  • 3 篇 key
  • 3 篇 distribution
  • 3 篇 complexity theor...
  • 3 篇 privacy
  • 3 篇 boolean function
  • 3 篇 identity-based e...

机构

  • 50 篇 state key labora...
  • 17 篇 state key labora...
  • 8 篇 fujian provincia...
  • 7 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 department of co...
  • 6 篇 state key labora...
  • 5 篇 school of cybers...
  • 5 篇 trusted computin...
  • 4 篇 school of comput...
  • 4 篇 college of scien...
  • 4 篇 key laboratory o...
  • 4 篇 college of crypt...
  • 4 篇 science and tech...
  • 3 篇 key laboratory o...
  • 3 篇 university of ch...
  • 3 篇 college of mathe...
  • 3 篇 school of cyber ...
  • 3 篇 school of cyber ...
  • 3 篇 state key labora...

作者

  • 6 篇 chao wang
  • 6 篇 dengguo feng
  • 5 篇 yiliang han
  • 5 篇 dawu gu
  • 5 篇 ke pinhui
  • 5 篇 jiang zhang
  • 5 篇 liehuang zhu
  • 4 篇 fei gao
  • 4 篇 an wang
  • 4 篇 zhenfeng zhang
  • 4 篇 chao li
  • 4 篇 debiao he
  • 4 篇 shaojing fu
  • 4 篇 baonan wang
  • 3 篇 shuqin fan
  • 3 篇 jinbo xiong
  • 3 篇 baodong qin
  • 3 篇 xiaowei duan
  • 3 篇 lin dongdai
  • 3 篇 ximeng liu

语言

  • 157 篇 英文
  • 7 篇 中文
检索条件"机构=Cryptology"
164 条 记 录,以下是1-10 订阅
排序:
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 635-644页
作者: Wenxiao QIAO Siwei SUN Lei HU State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences School of cryptology University of Chinese Academy of Sciences State Key Laboratory of cryptology
The rapid development of modern cryptographic applications such as zero-knowledge,secure multiparty computation,fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A New High-Precision and Lightweight Detection Model for Illegal Construction Objects Based on Deep Learning
收藏 引用
Tsinghua Science and Technology 2024年 第4期29卷 1002-1022页
作者: Wenjin Liu Lijuan Zhou Shudong Zhang Ning Luo Min Xu School of Cyberspace Security(School of cryptology) Hainan UniversityHaikou 570228China School of Information Engineering Capital Normal UniversityBeijing 100048China
Illegal construction has caused serious harm around the world. However, current methods are difficult to detect illegal construction activities in time, and the calculation complexity and the parameters of them are la... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM
收藏 引用
Science China(Information Sciences) 2024年 第11期67卷 317-334页
作者: Kexin QIAO Zhaoyang WANG Heng CHANG Siwei SUN Zehan WU Junjie CHENG Changhai OU An WANG Liehuang ZHU School of Cyberspace Science and Technology Beijing Institute of Technology State Key Laboratory of cryptology School of cryptology University of Chinese Academy of Sciences School of Cyber Science and Engineering Wuhan University
The implementation security of post-quantum cryptography(PQC) algorithms has emerged as a critical concern with the PQC standardization process reaching its end. In a side-channel-assisted chosen-ciphertext attack, th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 19-29页
作者: Kexin QIAO Zhiyu ZHANG Zhongfeng NIU Liehuang ZHU School of Cyberspace Science and Technology Beijing Institute of Technology State Key Laboratory of cryptology Institute of Information Engineering Chinese Academy of Sciences School of Cryptography University of Chinese Academy of Sciences
Recent results show that the differential properties within quadruples boom as a new inspiration in cryptanalysis of Advanced Encryption Standard(AES)-like constructions. These methods include the exchange attack prop... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
RWNeRF:Robust Watermarking Scheme for Neural Radiance Fields Based on Invertible Neural Networks
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4065-4083页
作者: Wenquan Sun Jia Liu Weina Dong Lifeng Chen Fuqiang Di Department of Cryptographic Engineering Engineering University of PAPXi’an710086China Department of Cryptographic Engineering Key Laboratory of PAP for Cryptology and Information SecurityXi’an710086China
As neural radiance fields continue to advance in 3D content representation,the copyright issues surrounding 3D models oriented towards implicit representation become increasingly *** response to this challenge,this pa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum algorithm for minimum dominating set problem with circuit design
收藏 引用
Chinese Physics B 2024年 第2期33卷 178-188页
作者: 张皓颖 王绍轩 刘新建 沈颖童 王玉坤 Beijing Key Laboratory of Petroleum Data Mining China University of PetroleumBeijing 102249China State Key Laboratory of cryptology P.O.Box 5159Beijing 100878China
Using quantum algorithms to solve various problems has attracted widespread attention with the development of quantum *** are particularly interested in using the acceleration properties of quantum algorithms to solve... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
MarkINeRV: A Robust Watermarking Scheme for Neural Representation for Videos Based on Invertible Neural Networks
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4031-4046页
作者: Wenquan Sun Jia Liu Lifeng Chen Weina Dong Fuqiang Di Department of Cryptographic Engineering Engineering University of PAPXi’an710086China Department of Cryptographic Engineering Key Laboratory for Cryptology and Information SecurityXi’an710086China
Recent research advances in implicit neural representation have shown that a wide range of video data distributions are achieved by sharing model weights for Neural Representation for Videos(NeRV).While explicit metho... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
LOL: a highly flexible framework for designing stream ciphers
收藏 引用
Science China(Information Sciences) 2024年 第9期67卷 62-75页
作者: Dengguo FENG Lin JIAO Yonglin HAO Qunxiong ZHENG Wenling WU Wenfeng QI Lei ZHANG Liting ZHANG Siwei SUN Tian TIAN State Key Laboratory of cryptology PLA Strategic Support Force Information Engineering University Institute of Software Chinese Academy of Sciences Westone Cryptologic Research Center School of cryptology University of Chinese Academy of Sciences
In this paper, we propose LOL, a general framework for designing blockwise stream ciphers. The proposed framework achieves ultrafast software implementations for ubiquitous virtual networks in 5G/6G environments and h... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Generalized splitting-ring number theoretic transform
收藏 引用
Frontiers of Computer Science 2024年 第4期18卷 205-207页
作者: Zhichuang LIANG Yunlei ZHAO Zhenfeng ZHANG School of Computer Science Fudan UniversityShanghai 200433China State Key Laboratory of cryptology Beijing 100036China Institute of Software Chinese Academy of SciencesBeijing 100190China
1 Introduction Lattice-based cryptography is one of the most promising routine of post-quantum cryptography(PQC).The fundamental and time-consuming operation in lattice-based schemes is the polynomial multiplication i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论