Cryptography相关论文
In a digital society,the rapid development of computer science and the Internet has greatly facilitated image applica-ti......
...
...
...
基于借记的微支付系统不存在超额消费问题,但要更新没有花掉的过期电子现金;基于信用的微支付系统不必更新没有花掉的过期电子现金,......
In view of the degeneration problem of chaos characteristics of the secret-key sequences,a new key sequence generation s......
ElGamal cryptography is one of the most important Public Key Cryptography(PKC)since Diffie-hellman exchangs was proposed......
The generalized Huff curve which contains Huffs model as a special case is introduced in this paper.It is shown that eve......
The extensive set of physical attack techniques implies to a clear threat to devices that execute cryptography.A fault a......
This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of......
In this paper,we present the generalized Huff curves that contain Huffs model as a special case.First,it is proved that ......
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polyn
To protect against algebraic attacks,a high algebraic immunity is now an important criterion for Boolean functions used ......
In this age when most organizations make use of cloud computing,it is important to not only protect cloud computing reso......
In this age when most organizations make use of cloud computing, it is important to not only protect cloud computing res......
One of the advantages of One Time Password (OTP) is that it’s free from brute force, replay, and shoulder attacks. The ......
Over the last few years,the need of a cloud environment with the ability to detect illegal behaviours along with a secur......
Construction of balanced Boolean functions with high nonlinearity, good local and global avalanche c
Boolean functions possessing multiple cryptographic criteria play an important role in the design of symmetric crypt......
Yaos millionairesproblemYaos millionairesproblem(YMP)and set-inclusion problem(SIP)are two well known secure two-par......
As a popular real-time service on the Internet,Voice over Internet Protocol(VoIP)communication attracts more and more at......
GENERATING AND COUNTING A CLASS OF BINARY BENT SEQUENCES WHICH IS NEITHER BENT-BASED NOR LINEAR-BASE
I. INTRODUCTION MacWilliams and Sloane listed as an open problem the classification of all Bent functions of a given ord......
Algebraic immunity has been considered as one of cryptographically significant properties for Boolean functions. In this......
All (2m +1)-variable symmetric Boolean functions with submaximal algebraic immunity 2m-1 are described and constructed. ......
This paper improves the method of discrete logarithm on anomalous elliptic curves, and establishes an isomorphism from E......
In this paper, we report our recent experiment of long-distance fiber-optic 'plug and play' quantum cryptography......
Yao’s millionaires’ problem is a fundamental problem in secure multiparty computation, and its solutions have become b......
Quantum key distribution (QKD) technology provides proven unconditional point-to-point security based on fundamental qua......
Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theor......
An embedded cryptosystem needs higher reconfiguration capability and security.After analyzing the newly emerging side-ch......
The biggest obstacle for long distance quantum communication is the channel loss and the channel noise on photons. In th......
A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported......
A reconfigurable cipher chip for accelerating DES is described, 3DES and AES computations that demand high performance a......
It is crucial to design energy-efficient advanced encryption standard (AES) cryptography for low power embedded systems ......
All-optical realization of × NOR logic gate using chaotic semiconductor lasers under phase modulator
The theoretical construction of the fundamental × NOR gate using two injection semiconductor laser diodes due to mutual......
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR N
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without fi......
According to Einstein’s theory of relativity,it shouldn’t Impossible.It’s called quantum teleportation,and it sounds ......
Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor
Identity-based cryptography (IBC) has drawn a lot of attentions in delay tolerant environment. However, the high computa......
Because of the need to ensure that only those eyes intended to view sensitive information can ever see this information,......
User authentication plays very role in computing system.In this thesis,firstly we studied Smart Card and user authentica......
Quantum information science is a combination of quantum mechanics and information science,which transforms computing,cod......
数据保密在现代网络通讯或电子商务中至关重要。保密(安全)微处理器的诞生,就是为了抵御各种对安全机制的入侵和加速保密运算操作......
Cloud storage can provide flexible and scalable data storage services to users. However, once data is uploaded to the cl......
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encry......
We present a new approach to reduce the communication overhead caused by threshold cryptography using modified multicast......
XML加密为结构数据的安全交换提供了端到端的加密。文章介绍了现有解决方案存在的问题,提供了一个实现基于XML数据安全交换的类。
......
An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
Security of wireless sensor networks has received considerable attention. It is a critical challenge to find out suitabl......
Measuring the two photons from a Bell state will yield certain correlations between the measurement results. Based on th......
Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the ex......
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryp-......
Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the de......
By analysis and comparison of several chaotic systems that are applied to generate pseudo-random sequence, the generaliz......