中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [28]
中国科学院大学 [4]
计算技术研究所 [1]
数学与系统科学研究院 [1]
武汉物理与数学研究所 [1]
采集方式
OAI收割 [31]
iSwitch采集 [4]
内容类型
期刊论文 [19]
会议论文 [16]
发表日期
2020 [1]
2018 [1]
2016 [1]
2013 [1]
2012 [3]
2011 [10]
更多
学科主题
Computer S... [1]
Computer S... [1]
Engineerin... [1]
Telecommun... [1]
筛选
浏览/检索结果:
共35条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
OAI收割
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
  |  
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6, 页码: 1705-1715
作者:
Zhang, HuanGuo
;
Liang, XiaoYan
;
Wu, WanQing
;
Cai, QingYu
  |  
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2018/08/15
Quantum Cryptography
Quantum Public Key Cryptosystem
Ciphertext Indistinguishability
Chosen Plaintext Attack
Holevo's Theorem
Bell States
Bit-oriented quantum public-key encryption based on quantum perfect encryption
期刊论文
iSwitch采集
Quantum information processing, 2016, 卷号: 15, 期号: 8, 页码: 3285-3300
作者:
Wu, Chenmiao
;
Yang, Li
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2019/05/09
Quantum cryptography
Quantum public-key encryption
Bit-oriented encryption
Information-theoretic security
cryptanalysis of some certificateless signature schemes in the standard model
期刊论文
OAI收割
International Journal of Applied Mathematics and Statistics, 2013, 卷号: 36, 期号: 6, 页码: 16-25
Wu Chenhuang
;
Lin Weidi
;
Huang Hui
;
Chen Zhixiong
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2013/09/17
Public key cryptography
selective opening chosen ciphertext security directly from the ddh assumption
会议论文
OAI收割
6th International Conference on Network and System Security, NSS 2012, Wuyishan, Fujian, China, November 21, 2012 - November 23, 2012
Liu Shengli
;
Zhang Fangguo
;
Chen Kefei
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2013/09/22
Public key cryptography
related-mode attacks on pmac
会议论文
OAI收割
2011 International Conference on Instrumentation, Measurement, Circuits and Systems, ICIMCS 2011, Hong Kong, Hong kong, December 12, 2011 - December 13, 2011
Xu Jin
;
Wen Qiaoyan
;
Wang Dayin
  |  
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2013/09/22
Authentication
Measurements
Public key cryptography
Security of data
an efficient and provably-secure certificateless signature scheme without bilinear pairings
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 卷号: 25, 期号: 11, 页码: 1432-1442
He D.
;
Chen J.
;
Zhang R.
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2013/09/17
certificateless public key cryptography
certificateless signature
bilinear pairings
elliptic curve
efficient threshold encryption from lossy trapdoor functions
会议论文
OAI收割
4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, Taipei, Taiwan, November 2
Xie Xiang
;
Xue Rui
;
Zhang Rui
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2013/10/08
Crystal lattices
Public key cryptography
asymptotic granularity reduction and its application
期刊论文
OAI收割
Theoretical Computer Science, 2011, 卷号: 412, 期号: 39, 页码: 5374-5386
Su Shenghui
;
L
;
Shuwang
;
Fan Xiubin
  |  
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2011/10/10
Algebra
Asymptotic analysis
Public key cryptography
simple power analysis attacks using chosen message against ecc hardware implementations
会议论文
OAI收割
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun
;
Wu Keke
;
Xu Guoqing
;
Yuan Hai
;
Luo Peng
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2011/10/10
Algorithms
Hardware
Internet
Public key cryptography
Telecommunication networks