咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 电子科学与技术(可...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 5 篇 cryptography
  • 1 篇 computer science
  • 1 篇 filters
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 quantum computin...
  • 1 篇 probability dist...
  • 1 篇 cryptographic ha...
  • 1 篇 quantum entangle...
  • 1 篇 collisions
  • 1 篇 application soft...
  • 1 篇 atom optics
  • 1 篇 dictionaries
  • 1 篇 physics computin...
  • 1 篇 unidirectional
  • 1 篇 computer securit...
  • 1 篇 australia counci...
  • 1 篇 keyword search
  • 1 篇 authentication
  • 1 篇 block cipher

机构

  • 2 篇 center for advan...
  • 2 篇 clayton school o...
  • 2 篇 faculty of mathe...
  • 1 篇 center for advan...
  • 1 篇 department of ph...
  • 1 篇 dept. of physics...
  • 1 篇 center for advan...
  • 1 篇 departmnent of p...
  • 1 篇 oregon center fo...
  • 1 篇 center for advan...
  • 1 篇 center for advan...
  • 1 篇 center of advanc...
  • 1 篇 division of math...
  • 1 篇 system security ...
  • 1 篇 school of comput...
  • 1 篇 center for advan...
  • 1 篇 division of math...
  • 1 篇 department of ph...
  • 1 篇 center for compu...
  • 1 篇 department of co...

作者

  • 7 篇 pieprzyk josef
  • 3 篇 josef pieprzyk
  • 3 篇 orumiehchiha moh...
  • 3 篇 steinfeld ron
  • 2 篇 shakour elham
  • 2 篇 huaxiong wang
  • 1 篇 m.g. raymer
  • 1 篇 de guise h.
  • 1 篇 hassan jameel as...
  • 1 篇 raymer m.g.
  • 1 篇 cho joo yeon
  • 1 篇 a. funk
  • 1 篇 al-ibrahim moham...
  • 1 篇 peishun wang
  • 1 篇 ahmad-reza sadeg...
  • 1 篇 shujun li
  • 1 篇 roland schmitz
  • 1 篇 sanders b.c.
  • 1 篇 funk a.
  • 1 篇 h. de guise

语言

  • 12 篇 英文
检索条件"机构=Center for Advanced Computing Algorithms and Cryptography"
12 条 记 录,以下是1-10 订阅
排序:
Security evaluation of Rakaposhi stream cipher
Security evaluation of Rakaposhi stream cipher
收藏 引用
9th International Conference on Information Security Practice and Experience, ISPEC 2013
作者: Orumiehchiha, Mohammad Ali Pieprzyk, Josef Shakour, Elham Steinfeld, Ron Center for Advanced Computing Algorithms and Cryptography Department of Computing Macquarie University Sydney NSW 2109 Australia Faculty of Mathematics Amirkabir University Tehran Iran Clayton School of Information Technology Monash University Clayton VIC 3800 Australia
Rakaposhi is a synchronous stream cipher, which uses three main components: a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF). NLF... 详细信息
来源: 评论
Cryptanalysis of RC4(n, m) stream cipher  13
Cryptanalysis of RC4(n, m) stream cipher
收藏 引用
6th International Conference on Security of Information and Networks, SIN 2013
作者: Orumiehchiha, Mohammad Ali Pieprzyk, Josef Shakour, Elham Steinfeld, Ron Center for Advanced Computing - Algorithms and Cryptography Macquarie University Sydney NSW 2109 Australia Faculty of Mathematics Amirkabir University Tehran Iran Clayton School of Information Technology Monash University Clayton VIC 3800 Australia
RC4(n, m) is a stream cipher based on RC4 and is designed by G. Gong et al. It can be seen as a generalization of the famous RC4 stream cipher designed by Ron Rivest. The authors of RC4(n, m) claim that the cipher res... 详细信息
来源: 评论
Cryptanalysis of RC4-based hash function
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in Information Technology Series 2012年 125卷 33-38页
作者: Orumiehchiha, Mohammad Ali Pieprzyk, Josef Steinfeld, Ron Center for Advanced Computing Algorithms and Cryptography Department of Computing Faculty of Science Macquarie University Sydney NSW 2109 Australia
RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the att... 详细信息
来源: 评论
Evolution of Cryptographic Hashing  10
Evolution of Cryptographic Hashing
收藏 引用
International Conference on Security of Information and Networks
作者: Josef Pieprzyk Center for Advanced Computing - Algorithms and Cryptography Department of Computing Macquarie University Sydney AUSTRALIA
Hash functions were invented in Computer Science as a tool for fast searching, where collisions were a desired property as long as they tend to occur with uniform probability distribution. The invention of digital sig... 详细信息
来源: 评论
Secure coprocessor-based private information retrieval without periodical preprocessing
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in Information Technology Series 2010年 105卷 5-11页
作者: Wang, Peishun Wang, Huaxiong Pieprzyk, Josef School of Computer Science and Software Engineering University of Wollongong NSW 2522 Australia Center for Advanced Computing Algorithms and Cryptography Department of Computing Macquarie University NSW 2109 Australia Division of Mathematical Sciences School of Physical and Mathematical Sciences Nanyang Technological University Singapore
Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. Theyseemed to achieve this goal but at the expense of query response time. To mitigate this weakness, prot... 详细信息
来源: 评论
On the Security of PAS (Predicate-Based Authentication Service)
On the Security of PAS (Predicate-Based Authentication Servi...
收藏 引用
Annual Computer Security Applications Conference
作者: Shujun Li Hassan Jameel Asghar Josef Pieprzyk Ahmad-Reza Sadeghi Roland Schmitz Huaxiong Wang Department of Computer and Information Science University of Konstanz Germany Center of Advanced Computing Algorithms and Cryptography Macquarie University Australia System Security Group Ruhr University of Bochum Germany Department of Computer Science and Media Stuttgart Media University Germany Division of Mathematical Sciences Nanyang Technological University Singapore
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resi... 详细信息
来源: 评论
Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data
Improvement of a Dynamic Accumulator at ICICS 07 and Its App...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Peishun Wang Huaxiong Wang Josef Pieprzyk Center for Advanced Computing-Algorithms and Cryptography Department of Computing Macquarie University NSW Australia
A dynamic accumulator is an algorithm, which merges a large set of elements into a constant-size value such that for an element accumulated, there is a witness confirming that the element was included into the value, ... 详细信息
来源: 评论
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3017卷 49-64页
作者: Cho, Joo Yeon Pieprzyk, Josef Center for Advanced Computing - Algorithms and Cryptography Department of Computing Macquarie University NSW 2109 Australia
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obtain multivariate equations of degree 10... 详细信息
来源: 评论
Separability criterion for separate quantum systems
Separability criterion for separate quantum systems
收藏 引用
Quantum Electronics and Laser Science, QELS 2003
作者: Raymer, M.G. Funk, A. Sanders, B.C. De Guise, H. Oregon Center for Optics Department of Physics University of Oregon EugeneOR97403 United States Department of Physics Centre for Advanced Computing -Algorithms and Cryptography Macquarie University SydneyNSW2109 Australia Dept. of Physics Lakehead University Thunder BayOntarioP7B 5E1 Canada
We develop a sufficiency criterion for quantum separability, valid for arbitrary states of two arbitrary systems. Our criterion confirms spin entanglement of two macroscopic atomic samples in experiments by Julsgaard,... 详细信息
来源: 评论
Separability criterion for separate quantum systems
Separability criterion for separate quantum systems
收藏 引用
Quantum Electronics and Laser Science Conference (QELS)
作者: M.G. Raymer A. Funk B.C. Sanders H. de Guise Oregon Center for Optics and Department of Physics University of Oregon Eugene OR USA Departmnent of Physics and Centre for Advanced Computing-Algorithms and Cryptography Macquarie University Sydney NSW Australia Department of Physics Lakehead University Thunder Bay ONT Canada
Summary form only given. We develop a sufficiency criterion for quantum separability, valid for arbitrary states of two arbitrary systems. Our criterion confirms spin entanglement of two macroscopic atomic samples in ... 详细信息
来源: 评论