cryptographic相关论文
Machine learning has a powerful potential for performing the template attack(TA) of cryptographic device. To improve the......
One pot synthesis, crystal structures and properties of two new MOFs with imidazole-containing tripo
Two new different Cu(Ⅱ) MOFs with the same 1,3,5-tris(1-imidazolyl) benzene(tib) ligand {[Cu(tib)2]·(H2O)2·Br2}n(1) a......
Yao’s millionaires’ problem is a fundamental problem in secure multiparty computation, and its solutions have become b......
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic att......
Temporal key integrity protocol(TKIP) is a sub-protocol of IEEE 802.11i.TKIP remedies some security flaws in wired equiv......
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure i......
A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported......
The reconfigurable cryptographic chip is an integrated circuit that is designed by means of the method of reconfigurable......
Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to ......
In this paper, we propose a method that builds power model template according to input transitions of combinatorial logi......
Cloud is an emerging computing paradigm.It has drawn extensive attention from both academia and industry.But its securit......
由于寄存器文件严重影响可重构密码处理器的性能和面积,为了实现高性能和低面积消耗的密码处理器,提出了一种高效的分布式跨域寄存......
More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in ......
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem......
Cryptography is an important tool in the design and implementation of e-voting schemes since it can provide verifiabilit......
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protoc......
Along with the rapid development and wide application of information technology, human society has entered the informati......
A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is ......
本论文描述一种易使人误解(几乎使人为难)的简单技术,它就是密囊(cryptographic capsule)技术。此技术允许艾利斯(Alice)在没有把......
The variety of encryption mechanism and algorithms which were conventionally used have some limitations. The kernel oper......
Recently, many bit commitment schemes have been presented. This paper presents a new practical bit commitment scheme ba......
Hash functions are often used in the authentication of information security field. With the development of electronic co......
In key escrow field it is important to solve the problem that user’s secret key completely depends on the trusted escro......
In this paper, some similarities and differences between chaos maps and cryptographic algorithms arediscussed. Mapping ......
Specification language is used to provide enough information for the model of the cryptographic protocol. This paper fir......
The ElGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems......
As soon as a P2P application grows to the point where it becomes interesting, the issues of trust and security appear on......
We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic bi......
In ACISP 2008,the hash family DASH has been proposed by Billet et al.,which considers the design of Rijndael and RC6.DAS......
CRYPTOGRAPHIC PROCESSING APPARATUS,CRYPTOGRAPHIC PROCESSING METHOD,AND STORAGE MEDIUM STORING CRYPTO
To provide a cryptographic processing apparatus that cryp- tographically processes input data using substitution table ......
With the development of data intensive application, such as multimedia, data warehouse, and online analysis processing, ......
将密码协议与密码算法视为一个系统,建立了密码协议系统的一种安全模型.基于假设/保证的组合推理技术提出了新的假设/保证推理规则......
Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof definin......
We use evolutionary computing to synthesize Boolean functions randomly. By using specific crossover and mutation operato......
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domai......
A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). Th......
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It w......
This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of or......
In this paper, we propose a partially non-cryptographic security routing protocol(PNCSR ) that protects both routing and......
Zhou et al give an attack on Harn’s modified authenticated multi-key agreement protocol, and give a protocol that can p......
Rotation symmetric function was presented by Pieprzyk. The algebraic configuration of rotation symmetric(RotS) function ......
With the rapid development of cryptography, the strength of security protocols and encryption algorithms consumedly reli......
首先讨论了剩余类环上多输出m值逻辑函数的相关函数的若干性质,然后给出了多输出m值逻辑函数的相关函数的概率表示式,最后得到了多......
In this paper, a general framework for designing and analyzing password-based security protocols is presented. First we ......
In this paper, we study Boolean functions of an odd number of variables with maximum algebraic immunity. We identify thr......
Random numbers play an increasingly important role in secure wire and wireless communication. Thus the design quality of......
为了提高数字签名方案的安全强度,设计了一个同时基于2个难解问题的数字签名方案.离散对数问题和因式分解问题是密码学中2个著名的......
Combining with the research on the linear complexity of explicit nonlinear generators of pseudorandom sequences,we study......
Chrestenson Spectrum and Auto-Correlation Function of Inverse Permutations of Quick Trickle Permutat
In this paper,a sufficient and necessary condition of quick trickle permutations is given from the point of inverse per-......
Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step more efficient......