咨询与建议

限定检索结果

文献类型

  • 22 篇 期刊文献

馆藏范围

  • 22 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 6 篇 网络空间安全
    • 4 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 机械工程
    • 1 篇 信息与通信工程
  • 11 篇 理学
    • 7 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 4 篇 军事学
    • 4 篇 军队指挥学

主题

  • 3 篇 quantum
  • 2 篇 threshold
  • 2 篇 secret
  • 2 篇 cryptography
  • 2 篇 sharing
  • 1 篇 standard model
  • 1 篇 information hidi...
  • 1 篇 proxy
  • 1 篇 joint source-cha...
  • 1 篇 statistical dist...
  • 1 篇 trusted computin...
  • 1 篇 correlation immu...
  • 1 篇 access structure
  • 1 篇 braid group
  • 1 篇 direct
  • 1 篇 video hashing
  • 1 篇 fuzzy identity b...
  • 1 篇 product
  • 1 篇 avs audio
  • 1 篇 shared

机构

  • 2 篇 1. college of co...
  • 1 篇 1. state key lab...
  • 1 篇 the department o...
  • 1 篇 2. state key lab...
  • 1 篇 the school of ph...
  • 1 篇 1. zhengzhou inf...
  • 1 篇 3. state key lab...
  • 1 篇 1. school of inf...
  • 1 篇 2. state key lab...
  • 1 篇 1. guangdong key...
  • 1 篇 1. science colle...
  • 1 篇 1. science colle...
  • 1 篇 the department o...
  • 1 篇 4. state key lab...
  • 1 篇 1. beijing unive...
  • 1 篇 3. state key lab...
  • 1 篇 4. national key ...
  • 1 篇 3. school of sci...
  • 1 篇 1. school of inf...
  • 1 篇 key laboratory o...

作者

  • 1 篇 2 school of scie...
  • 1 篇 3 state key labo...
  • 1 篇 zhang wenying1 2...
  • 1 篇 2state key lab o...
  • 1 篇 shen changxiang1...
  • 1 篇 3shandong provin...
  • 1 篇 3 shanghai key l...
  • 1 篇 3national mobile...
  • 1 篇 2 state key labo...
  • 1 篇 2 china informat...
  • 1 篇 2 school of math...
  • 1 篇 sun bing 1 li ru...
  • 1 篇 3 national mobil...
  • 1 篇 4 national key l...
  • 1 篇 4department of e...
  • 1 篇 zhang fangguo 1 ...
  • 1 篇 wang changji 1 2...
  • 1 篇 yang yuguang1 3 ...
  • 1 篇 fu shaojing1 li ...
  • 1 篇 3 school of info...

语言

  • 22 篇 英文
检索条件"机构=1. Key Laboratory of Cryptologic Technology and Information Security"
22 条 记 录,以下是1-10 订阅
排序:
Self-injective rings and linear (weak) inverses of linear finite automata over rings
收藏 引用
Science China Mathematics 1999年 第2期42卷 140-146页
作者: 欧海文 戴宗铎 1. State Key Laboratory of Information Security Graduate School University of Science and Technology of China 100039 Beijing China
LetR be a finite commutative ring with identity and τ be a nonnegative integer. In studying linear finite automata, one of the basic problems is how to characterize the class of rings which have the property that eve... 详细信息
来源: 评论
Robust AVS audio watermarking
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 607-618页
作者: WANG Yong & HUANG JiWu Guangdong key {1. of information security technology, School of information Science and technology, Sun Yat-Sen University, Guangzhou 51.275, China 1. Guangdong Key Laboratory of Information Security Technology School of Information Science and Technology Sun Yat-Sen University Guangzhou 510275 China
Part Ⅲ of AVS (China Audio and Video Coding Standard) is the first generic audio standard proposed in China and is becoming popular in some applications. For MP3 audio, some effiorts have been made to solve the copyr... 详细信息
来源: 评论
Twisted Ate pairing on hyperelliptic curves and applications
收藏 引用
Science China(information Sciences) 2010年 第8期53卷 1528-1538页
作者: ZHANG FangGuo 1.2 1.School of information Science and {1., Sun Yat-Sen University, Guangzhou 51.275, China 2 Guangdong key laboratory of information security {1., Guangzhou 51.275, China 1. School of Information Science and Technology Sun Yat-Sen University Guangzhou 510275 China2. Guangdong Key Laboratory of Information Security Technology Guangzhou 510275 China
In this paper we show that the twisted Ate pairing on elliptic curves can be generalized to hyperelliptic curves, and give a series of variations of the hyperelliptic Ate and twisted Ate pairings. Using the hyperellip... 详细信息
来源: 评论
Steganalysis of stochastic modulation steganography
收藏 引用
Science in China(Series F) 2006年 第3期49卷 273-285页
作者: HE Junhui1.2 & HUANG Jiwu1.2 1. School of information Science and {1., Sun Yat-sen University, Guangzhou 51.275, China 2. Guangdong Province key laboratory of information security, Guangzhou 51.275, China 1. School of Information Science and Technology Sun Yat-sen University Guangzhou 510275 China 2. Guangdong Province Key Laboratory of Information Security Guangzhou 510275 China
Stochastic modulation steganography embeds secret message within the cover image by adding stego-noise with a specific probabilistic distribution. No method is known to be applicable to the estimation of stochastic mo... 详细信息
来源: 评论
New application methods for word-oriented cryptographic primitives
收藏 引用
Science China(information Sciences) 2012年 第9期55卷 2149-2160页
作者: YANG Yang 1.2,ZENG Guang 1.2,JIN ChengHui 1.& QU YunYing 1.1.Zhengzhou information Science and {1. Institute,Zhengzhou 450002,China 2 State key laboratory of information security,Institute of Software,Chinese Academy of Sciences,Beijing 1.01.0,China 1. Zhengzhou Information Science and Technology Institute Zhengzhou 450002 China2. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic *** the output sequence,in the order of its generation,of a word-oriented cryptographic primitive in the sa... 详细信息
来源: 评论
A provable secure fuzzy identity based signature scheme
收藏 引用
Science China(information Sciences) 2012年 第9期55卷 2139-2148页
作者: WANG ChangJi 1.2 1.School of information Science and {1.,Sun Yat-sen University,Guangzhou 51.275,China 2 Guangdong Province information security key laboratory,Sun Yat-sen University,Guangzhou 51.275,China 1. School of Information Science and Technology Sun Yat-sen University Guangzhou 510275 China2. Guangdong Province Information Security Key Laboratory Sun Yat-sen University Guangzhou 510275 China
To use biometrics identities in an identity based encryption system,Sahai and Waters first introduced the notion of fuzzy identity based encryption(FIBE) in *** et *** it to digital signature and introduced the concep... 详细信息
来源: 评论
Conjugate adjoining problem in braid groups and new design of braid-based signatures
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 524-536页
作者: WANG LiCheng1.2, WANG LiHua2, CAO ZhenFu3, YANG YiXian1.& NIU XinXin1.information {1. Center, State key laboratory of Networking and Switching technology, Beijing University of Posts and Telecommunications, Beijing 1.0876, China 2National Institute of information and Communications technology, Tokyo 1.4-8795, Japan 3Trusted Digital technology laboratory, Shanghai Jiao Tong University, Shanghai 200240, China 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. National Institute of Information and Communications Technology Tokyo 184-8795 Japan3. Trusted Digital Technology Laboratory Shanghai Jiao Tong University Shanghai 200240 China
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting... 详细信息
来源: 评论
On the number of rotation symmetric Boolean functions
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 537-545页
作者: FU ShaoJing1. LI Chao1.2 & QU LongJiang1.3 1.cience College of National University of Defense technology, Changsha 41.073, China 2State {1. laboratory of information security, Beijing 1.0039, China 3National Mobile Communications Research laboratory, Southeast University, Nanjing 21.096, China 1. Science College of National University of Defense Technology Changsha 410073 China2. State Key Laboratory of Information Security Beijing 100039 China3. National Mobile Communications Research Laboratory Southeast University Nanjing 210096 China
Rotation symmetric Boolean functions (RSBFs) have been used as components of different cryptosystems. This class of functions are invariant under circular translation of indices. In this paper, we investigated balance... 详细信息
来源: 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and technology,Beijing University of technology,Beijing 100124,China 2 State key laboratory of Networking and Switching technology,Beijing University of Posts and Tele-communications,Beijing 100876,China 3 State key laboratory of Integrated Services Network,Xidian University,Xi’an 710071,China 4 State key laboratory of information security(Graduate University of Chinese Academy of Sciences) ,Beijing 100049,China 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China 2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 评论
On an attack on RSA with small CRT-exponents
收藏 引用
Science China(information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1.2 , WANG XiaoYun 3 & XU GuangWu 3,4 1.key {1. of cryptologic technology and information security, Ministry of Education, Shandong University, Jinan 2501.0, China 2 School of Mathematics, Shandong University, Jinan 2501.0, China 3 Institute for Advanced Study, Tsinghua University, Beijing 1.0084, China 4 Department of Electrical Engineering and Computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201. USA 1. Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China2. School of Mathematics Shandong University Jinan 250100 China3. Institute for Advanced Study Tsinghua University Beijing 100084 China4. Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee WI 53201 USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 评论