咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 1 篇 certificateless ...
  • 1 篇 forgery attack
  • 1 篇 electricity carb...
  • 1 篇 blockchain
  • 1 篇 lagrange multipl...
  • 1 篇 carbon quota
  • 1 篇 geometry

机构

  • 4 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 gansu provincial...
  • 2 篇 college of mathe...
  • 1 篇 institute of chi...
  • 1 篇 college of big d...

作者

  • 2 篇 yuan wenping
  • 2 篇 qiao xingbin
  • 2 篇 du xiaoni
  • 2 篇 zhou huan
  • 1 篇 niu shufen
  • 1 篇 kong weiying
  • 1 篇 xiaodong yang
  • 1 篇 caifen wang
  • 1 篇 chen lihua
  • 1 篇 zhou xusheng
  • 1 篇 haoqi wen
  • 1 篇 runze diao
  • 1 篇 tao liu
  • 1 篇 wang ning

语言

  • 4 篇 英文
检索条件"机构=Key Laboratory of Cryptography and Data Analytics"
4 条 记 录,以下是1-10 订阅
排序:
Privacy-preserving and Verifiable Federated Learning with weighted average aggregation in edge computing
收藏 引用
Journal of Network and Computer Applications 2025年 240卷
作者: Niu, Shufen Kong, Weiying Chen, Lihua Zhou, Xusheng Wang, Ning College of Computer Science and Engineering Northwest Normal University Lanzhou730070 China Key Laboratory of Cryptography and Data Analytics Northwest Normal University Lanzhou730070 China
In Federated Learning (FL), clients collaborate with edge and cloud servers to train a global model without sharing raw data. However, cloud servers cannot be fully trusted due to the risk of malicious servers forging... 详细信息
来源: 评论
Electricity Carbon Quota Trading Scheme based on Certificateless Signature and Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第2期138卷 1695-1712页
作者: Xiaodong Yang Runze Diao Tao Liu Haoqi Wen Caifen Wang College of Computer Science and Engineering Northwest Normal UniversityLanzhou730070China Institute of China TelecomWanwei China TelecomWanwei Information Technology Co.Ltd.Lanzhou730030China College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Key Laboratory of Cryptography and Data Analytics Northwest Normal UniversityLanzhou730070China
The carbon tradingmarket can promote“carbon peaking”and“carbon neutrality”at low cost,but carbon emission quotas face attacks such as data forgery,tampering,counterfeiting,and replay in the electricity trading ***... 详细信息
来源: 评论
On the second-order zero differential properties of several classes of power functions over finite fields
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Huan Du, Xiaoni Qiao, Xingbin Yuan, Wenping College of Mathematics and Statistics Northwest Normal University Lanzhou730070 China Key Laboratory of Cryptography and Data Analytics Northwest Normal University Lanzhou730070 China Gansu Provincial Research Center for Basic Disciplines of Mathematics and Statistics Northwest Normal University Lanzhou730070 China
Feistel Boomerang Connectivity Table (FBCT) is an important crypt- analytic technique on analysing the resistance of the Feistel network-based ciphers to power attacks such as differential and boomerang attacks. Moreo...
来源: 评论
The c-differential properties of a class of power functions
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Huan Du, Xiaoni Yuan, Wenping Qiao, Xingbin College of Mathematics and Statistics Northwest Normal University Lanzhou730070 China Key Laboratory of Cryptography and Data Analytics Northwest Normal University Lanzhou730070 China Gansu Provincial Research Center for Basic Disciplines of Mathematics and Statistics Northwest Normal University Lanzhou730070 China
Power functions with low c-differential uniformity have been widely studied not only because of their strong resistance to multiplicative differential attacks, but also low implementation cost in hardware. Furthermore... 详细信息
来源: 评论