中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
数学与系统科学研究院 [5]
软件研究所 [4]
新疆理化技术研究所 [1]
武汉物理与数学研究所 [1]
中国科学院大学 [1]
采集方式
OAI收割 [11]
iSwitch采集 [1]
内容类型
期刊论文 [11]
会议论文 [1]
发表日期
2021 [1]
2019 [1]
2018 [3]
2017 [1]
2014 [1]
2011 [1]
更多
学科主题
Engineerin... [1]
筛选
浏览/检索结果:
共12条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project
期刊论文
OAI收割
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 18
作者:
Li, Haoyu
;
Liu, Renzhang
;
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
  |  
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2021/06/01
Ciphertext-only attack
Compact-LWE
NIST
post-quantum cryptography
An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
期刊论文
OAI收割
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 卷号: 15, 期号: 12, 页码: 6500-6509
作者:
Li, JQ (Li, Jianqiang)[ 1 ]
;
Wang, SL (Wang, Shulan)[ 2 ]
;
Li, Y (Li, Yuan)[ 1 ]
;
Wang, HY (Wang, Haiyan)[ 1 ]
;
Wang, HW (Wang, Huiwen)[ 1 ]
  |  
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2020/01/10
Encryption
Cloud computing
Outsourcing
Informatics
Computational efficiency
Attribute-based encryption (ABE)
ciphertext policy (CP)
Cloud computing
file update
policy update
Security performance analysis of a chaotic stream cipher
期刊论文
OAI收割
NONLINEAR DYNAMICS, 2018, 卷号: 94, 期号: 2, 页码: 1003-1017
作者:
Lin, Zhuosheng
;
Wang, Guangyi
;
Wang, Xiaoyuan
;
Yu, Simin
;
Lu, Jinhu
  |  
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2018/11/16
Chosen-ciphertext attack
Chaotic stream cipher
Security performance analysis
Attack complexity
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:
Lin, Zhuosheng
;
Yu, Simin
;
Feng, Xiutao
;
Lu, Jinhu
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2019/12/13
Chaotic stream cipher
divide-and-conquer attack
chosen-ciphertext attack
improved chaotic encryption algorithm
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6, 页码: 1705-1715
作者:
Zhang, HuanGuo
;
Liang, XiaoYan
;
Wu, WanQing
;
Cai, QingYu
  |  
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2018/08/15
Quantum Cryptography
Quantum Public Key Cryptosystem
Ciphertext Indistinguishability
Chosen Plaintext Attack
Holevo's Theorem
Bell States
On the cryptanalysis of Fridrich's chaotic image encryption scheme
期刊论文
OAI收割
SIGNAL PROCESSING, 2017, 卷号: 132, 页码: 150-154
作者:
Xie, Eric Yong
;
Li, Chengqing
;
Yu, Simin
;
Lu, Jinhu
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2018/07/30
Chaotic encryption
Chosen-ciphertext attack
Cryptanalysis
Differential attack
PRE: Stronger security notions and efficient construction with non-interactive opening
期刊论文
OAI收割
Theoretical Computer Science, 2014, 卷号: 542, 页码: 1-16
Zhang, Jiang (1)
;
Zhang, Zhenfeng (1)
;
Chen, Yu (3)
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2014/12/16
Public key encryption
Proxy re-encryption
Chosen key model
Knowledge of secret key model
Chosen-ciphertext security
DBDH
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem
期刊论文
OAI收割
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 卷号: 57, 期号: 3, 页码: 1780-1785
作者:
Pan, Yanbin
;
Deng, Yingpu
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2018/07/30
Cai-Cusick cryptosystem
ciphertext-only attack
Gram-Schmidt orthogonalization
lattice
New constructions for identity-based unidirectional proxy re-encryption
期刊论文
iSwitch采集
Journal of computer science and technology, 2010, 卷号: 25, 期号: 4, 页码: 793-806
作者:
Lai, Jun-Zuo
;
Zhu, Wen-Tao
;
Deng, Robert H.
;
Liu, Sheng-Li
;
Kou, Wei-Dong
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2019/05/10
Identity-based encryption (ibe)
Unidirectional proxy re-encryption
Mediated encryption (me)
Chosen ciphertext attack (cca)
Master secret security (mss)
a scalable encryption scheme for ccsds image data compression standard
会议论文
OAI收割
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, Beijing, 40878
Mingyu Li
;
Xiaowei Yi
;
Hengtai Ma
  |  
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2011/03/31
CCSDS image data compression standard
ciphertext bitstream
end-to-end security
low-complexity transparent transcoding
near rate-distortion
packet header
scalable encryption scheme
truncation points
cryptography
data compression
image coding
transcoding