×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [26]
清华大学 [25]
武汉大学 [23]
北京大学 [8]
上海电子信息职业技术... [8]
厦门大学 [7]
更多...
内容类型
期刊论文 [161]
发表日期
2021 [2]
2020 [2]
2019 [6]
2018 [15]
2017 [5]
2016 [17]
更多...
学科主题
Computer S... [9]
Informatio... [2]
Telecommun... [2]
Applied [1]
Computer S... [1]
Engineerin... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共161条,第1-10条
帮助
限定条件
内容类型:期刊论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 18
作者:
Li, Haoyu
;
Liu, Renzhang
;
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:57/0
  |  
提交时间:2021/06/01
Ciphertext-only attack
Compact-LWE
NIST
post-quantum cryptography
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-21
作者:
Aldabbagh, G (Aldabbagh, Ghadah)[ 1 ]
;
Alghazzawi, DM (Alghazzawi, Daniyal M.)[ 1 ]
;
Hasan, SH (Hasan, Syed Hamid)[ 1 ]
;
Alhaddad, M (Alhaddad, Mohammed)[ 1 ]
;
Malibari, A (Malibari, Areej)[ 1 ]
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/07/14
mobile learningcloud storagehybrid optical elliptic curve cryptographyadaptive tunicate slime moldencryptiondecryptionsecurity
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
The Novel Efficient Dual-field FIPS Modular Multiplication
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 卷号: 14, 期号: 2, 页码: 738-756
作者:
Zhang, Tingting
;
Zhu, Junru
;
Liu, Yang
;
Chen, Fulong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/12/10
Montgomery algorithm
FIPS
Modular Multiplication
Modular Square
Dual-field
A KIND OF DESIGN OF KNAPSACK PUBLIC KEY CRYPTOSYSTEM BASED ON CHAOTIC SYSTEM
期刊论文
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2019, 卷号: 81, 期号: 2, 页码: 165-176
作者:
Deng, Zhijuan
;
Zhong, Shaojun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/08/22
Cryptography
Chaos
Information Security
Threshold Method
A security scheme for intelligent substation communications considering real-time performance
期刊论文
JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2019, 卷号: 7, 期号: 4
作者:
Zhang, Jie
;
Li, Jun'e
;
Chen, Xiong
;
Ni, Ming
;
Wang, Ting
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Intelligent substation
Security measures
Certificateless public key cryptography (CLPKC)
Real-time communication
IEC 62351
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
期刊论文
ELECTRONIC COMMERCE RESEARCH, 2019, 卷号: 19, 期号: 3
作者:
Yu Fajiang
;
Chen Jing
;
Xiang Yang
;
Zhu Jiacheng
;
Zhao Yangdi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/05
Remote attestation
Trusted computing
Trusted platform module (TPM)
Combined public key cryptography (CPK)
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession
期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 卷号: 12, 期号: 5
作者:
Wang, Huaqun
;
He, Debiao
;
Yu, Jia
;
Wang, Zhiwei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
Protocols
Cloud computing
Concrete
Privacy
Public key cryptography
Servers
Cloud computing
provable data possession
identity-based cryptography
incentive
anonymity
Intellectual property protection for FPGA designs using the public key cryptography
期刊论文
ADVANCES IN MECHANICAL ENGINEERING, 2019, 卷号: Vol.11 No.4
作者:
Huang, WH
;
Li, RF
;
Xu, JB
;
Huang, Y
;
Hosam, O
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/17
Identity-Based Broadcast Encryption with Efficient Revocation
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 卷号: 11442 LNCS, 页码: 405-435
作者:
Ge, Aijun
;
Wei, Puwen
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/11
Asymmetric pairings
Broadcast encryption
Constant size ciphertext
Provable security
Revocation
©版权所有 ©2017 CSpace - Powered by
CSpace