中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [7]
中国科学院大学 [4]
自动化研究所 [3]
计算技术研究所 [2]
数学与系统科学研究院 [2]
武汉物理与数学研究所 [2]
更多
采集方式
OAI收割 [16]
iSwitch采集 [4]
内容类型
期刊论文 [20]
发表日期
2020 [1]
2018 [1]
2017 [2]
2014 [2]
2013 [1]
2012 [1]
更多
学科主题
Computer S... [1]
Computer S... [1]
Computer S... [1]
筛选
浏览/检索结果:
共20条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
OAI收割
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
  |  
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6, 页码: 1705-1715
作者:
Zhang, HuanGuo
;
Liang, XiaoYan
;
Wu, WanQing
;
Cai, QingYu
  |  
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2018/08/15
Quantum Cryptography
Quantum Public Key Cryptosystem
Ciphertext Indistinguishability
Chosen Plaintext Attack
Holevo's Theorem
Bell States
Quantum Public Key Cryptosystem Based on Bell States
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 卷号: 56, 期号: 11, 页码: 3431-3440
作者:
Liang, XiaoYan
;
Zhang, HuanGuo
;
Cai, QingYu
;
Wu, WanQing
  |  
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2017/12/06
Quantum Public Key Cryptosystem
Holevo's Theorem
Generalized Pauli Operations
Bell States
P-2-SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System
期刊论文
OAI收割
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 卷号: 35, 期号: 1, 页码: 173-187
作者:
Dou, Yanzhi
;
Zeng, Kexiong
;
Li, He
;
Yang, Yaling
;
Gao, Bo
  |  
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2019/12/12
Dynamic spectrum access
protection zone
secure multi-party computation
Paillier cryptosystem
Analysis and improvement of a provable secure fuzzy identity-based signature scheme
期刊论文
OAI收割
Science China Information Sciences, 2014, 卷号: 57, 期号: 9, 页码: 1-5
Xiong, Hu (1)
;
Chen, YaNan (4)
;
Zhu, GuoBin (1)
;
Qin, ZhiGuang (1)
  |  
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2014/12/16
identity-based cryptosystem
fuzzy identity-based signature
forgery attack
cryptanalysis
bilinear pairings
对ECC算法实现的选择明文攻击方法
期刊论文
OAI收割
通信学报, 2014, 卷号: 35, 期号: 5, 页码: 79-87
罗鹏
;
李慧云
;
王鲲鹏
;
王亚伟
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2014/12/16
ECC算法
标量乘法
选择明文攻击
侧信道分析
Elliptic curve cryptosystem
scalar multiplication
chosen message attack
side channel analysis
An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
期刊论文
OAI收割
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 卷号: 38, 期号: 8, 页码: 2055-2061
He, Debiao
;
Chen, Yitao
;
Chen, Jianhua
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
ID-based
Three-party key exchange
Elliptic curve cryptosystem
An effective biometric cryptosystem combining fingerprints with error correction codes
期刊论文
OAI收割
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 卷号: 39, 期号: 7, 页码: 6562-6574
作者:
Li, Peng
;
Yang, Xin
;
Qiao, Hua
;
Cao, Kai
;
Liu, Eryun
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2015/08/12
Minutia triplet
Binary length-fixed feature
Biometric cryptosystem
Fuzzy commitment scheme
ECC
Security
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem
期刊论文
OAI收割
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 卷号: 57, 期号: 3, 页码: 1780-1785
作者:
Pan, Yanbin
;
Deng, Yingpu
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2018/07/30
Cai-Cusick cryptosystem
ciphertext-only attack
Gram-Schmidt orthogonalization
lattice
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
期刊论文
OAI收割
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 卷号: 33, 期号: 3, 页码: 207-220
作者:
Li, Peng
;
Yang, Xin
;
Cao, Kai
;
Tao, Xunqiang
;
Wang, Ruifang
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2015/08/12
Fingerprint cryptosystem
Fuzzy fingerprint vault
Alignment-free
Minutia descriptor
Minutia local structure
Security