咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 10 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
    • 2 篇 网络空间安全
  • 4 篇 理学
    • 2 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 17 篇 pseudo-random fu...
  • 3 篇 security
  • 2 篇 authentication
  • 2 篇 distributed dete...
  • 2 篇 wireless sensor ...
  • 2 篇 likelihood ratio...
  • 2 篇 ddh problem
  • 1 篇 internet of thin...
  • 1 篇 homomorphic mess...
  • 1 篇 information hidi...
  • 1 篇 boolean query
  • 1 篇 lbs
  • 1 篇 outsourced cloud
  • 1 篇 key establishmen...
  • 1 篇 privacy protecti...
  • 1 篇 security proof
  • 1 篇 tweak
  • 1 篇 bilinear groups
  • 1 篇 location-based s...
  • 1 篇 medical cloud

机构

  • 1 篇 ntt corp ntt inf...
  • 1 篇 state grid elect...
  • 1 篇 school of teleco...
  • 1 篇 polytech montrea...
  • 1 篇 shandong univ sc...
  • 1 篇 fujian normal un...
  • 1 篇 shanghai jiao to...
  • 1 篇 indian stat inst...
  • 1 篇 sichuan univ sch...
  • 1 篇 technion israel ...
  • 1 篇 state grid jiang...
  • 1 篇 inst. of compute...
  • 1 篇 gifu univ gifu 3
  • 1 篇 china acad elect...
  • 1 篇 int inst informa...
  • 1 篇 inst. of applied...
  • 1 篇 sichuan univ col...
  • 1 篇 henan key labora...
  • 1 篇 s china agr univ...
  • 1 篇 stanford univ de...

作者

  • 2 篇 chen wen
  • 1 篇 林仁宏
  • 1 篇 liu yuling
  • 1 篇 bin lu
  • 1 篇 liu guangjun
  • 1 篇 yasuda kan
  • 1 篇 reingold o
  • 1 篇 kang ming
  • 1 篇 li zhang
  • 1 篇 das ashok kumar
  • 1 篇 boneh d
  • 1 篇 liwu zhang
  • 1 篇 liu shengli
  • 1 篇 weiwei miao
  • 1 篇 takano yasuhiro
  • 1 篇 li tao
  • 1 篇 xin ge
  • 1 篇 liu zhiqiang
  • 1 篇 huang xinyi
  • 1 篇 mohri masami

语言

  • 17 篇 英文
检索条件"主题词=pseudo-random function"
17 条 记 录,以下是1-10 订阅
排序:
pseudo-random functions and Parallelizable Modes of Operations of a Block Cipher
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2010年 第8期57卷 4025-4037页
作者: Sarkar, Palash Indian Stat Inst Appl Stat Unit Kolkata 700108 India
A general result is proved for constructions which use a pseudo-random function (PRF) with a "small" domain to build a PRF with a "large" domain. This result is used to analyse a new block-cipher b... 详细信息
来源: 评论
A New Class of pseudo-random functions
A New Class of Pseudo-random Functions
收藏 引用
Asia-Pacific Conference on Information Processing (APCIP 2009)
作者: Huang, Huawei S China Agr Univ Coll Informat Guangzhou 510642 Guangdong Peoples R China
This paper proposes a new construction of pseudo-random functions based on an extended decisional Diffie-Hellman (EDDH) problem proposed by Huang et al. The new construction is pseudo-random if the EDDH assumption hol... 详细信息
来源: 评论
Designing a Secure Round function Based on Chaos
收藏 引用
China Communications 2020年 第5期17卷 29-37页
作者: Bin Lu Xin Ge Fenlin Liu Zhengzhou Information Science and Technology Institute Zhengzhou 45000China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 45000China
A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data tran... 详细信息
来源: 评论
An efficient random key distribution scheme for large-scale distributed sensor networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2011年 第2期4卷 162-180页
作者: Das, Ashok Kumar Int Inst Informat Technol Dept Comp Sci & Engn Bhubaneswar 751013 Orissa India Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India
Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. Due to resource limitations and vulnerable to physical capture of the sensor nodes, the classical public-ke... 详细信息
来源: 评论
A New Class of pseudo-random functions
A New Class of Pseudo-random Functions
收藏 引用
2009 Asia-Pacific Conference on Information Processing
作者: Huawei Huang College of Information South China Agricultural University Guangzhou 510642, China
This paper proposes a new construction of pseudo-random functions based on an extended decisional Diffie-Hellman (EDDH) problem proposed by Huang et al. The new construction is pseudo-random if the EDDH assumption hol... 详细信息
来源: 评论
Authentication Scheme Using Pre-Registered Information on Blockchain
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2019年 第9期E102D卷 1676-1678页
作者: Tsuchida, Toshiki Takita, Makoto Shiraishi, Yoshiaki Mohri, Masami Takano, Yasuhiro Morii, Masakatu Kobe Univ Kobe Hyogo 6578501 Japan Gifu Univ Gifu 5011193 Japan
In the context of Cyber-Physical System (CPS), analyzing the real world data accumulated in cyberspace would improve the efficiency and productivity of various social systems. Towards establishing data-driven society,... 详细信息
来源: 评论
Privacy-preserving location-based service protocols with flexible access
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING 2019年 第3期20卷 412-423页
作者: Tang, Shuyang Liu, Shengli Huang, Xinyi Liu, Zhiqiang Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai Peoples R China Fujian Normal Univ Sch Math & Comp Sci Fuzhou Fujian Peoples R China
We propose an efficient privacy-preserving, content-protecting location-based service (LBS) scheme. Our proposal gives refined data classification and uses generalised ElGamal to support flexible access to different d... 详细信息
来源: 评论
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring
收藏 引用
INFORMATION PROCESSING LETTERS 1999年 第2期70卷 83-87页
作者: Biham, E Boneh, D Reingold, O Weizmann Inst Sci Dept Comp Sci & Appl Math IL-76100 Rehovot Israel Stanford Univ Dept Comp Sci Stanford CA 94305 USA Technion Israel Inst Technol Dept Comp Sci IL-32000 Haifa Israel
The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2 parties. This gives rise to the generalized Diffie-Hellman assumption (GDH-Assumption). Naor and Reingold have recently shown an efficient... 详细信息
来源: 评论
Privacy-preserving model for biometric-based authentication and Key Derivation function
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2023年 78卷
作者: Italis, Olson Pierre, Samuel Quintero, Alejandro Polytech Montreal Dept Comp & Software Engn 2500 Chem Polytech Montreal PQ H3T 1J4 Canada
Bio-cryptosystems often save the biometric template for authentication and generally employ randomly generated keys to encrypt and sign data. This method raises privacy protection concerns. Furthermore, for a system s... 详细信息
来源: 评论
An External Data Integrity Tracking and Verification System for Universal Stream Computing System Framework  21
An External Data Integrity Tracking and Verification System ...
收藏 引用
21st International Conference on Advanced Communication Technology (ICACT)
作者: Wang Hongyuan China Acad Elect & Informat Technol LoongCloud Common Prod Res Inst Beijing Peoples R China
With the development of the cloud computing and big data, massive data based computing and storage have emerged as core technologies. Moreover, a key problem to ensure data availability and analysis accuracy is the da... 详细信息
来源: 评论