咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 127 篇 工学
    • 83 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是91-100 订阅
排序:
Sub-Gbps key rate four-state continuous-variable quantum key distribution within metropolitan area
Research Square
收藏 引用
Research Square 2021年
作者: Wang, Heng Li, Yang Pi, Yaodi Pan, Yan Shao, Yun Ma, Li Yang, Jie Zhang, Yichen Huang, Wei Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
Continuous-variable quantum key distribution (CVQKD) has potential advantages of high secret key rate, which is very suitable for high-speed metropolitan network application. However, the reported highest secret key r... 详细信息
来源: 评论
Practical Continuous-variable Quantum Key Distribution with Feasible Optimization Parameters
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Li Yang, Jie Zhang, Tao Shao, Yun Liu, Jinlu Luo, Yujie Wang, Heng Huang, Wei Fan, Fan Zhou, Chuang Zhang, Liangliang Zhang, Shuai Zhang, Yichen Li, Yang Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
Continuous-variable quantum key distribution (CV-QKD) offers an approach to achieve a potential high secret key rate (SKR) in metropolitan areas. There are several challenges in developing a practical CV-QKD system fr... 详细信息
来源: 评论
An alternative approach for computing discrete logarithms in compressed SIDH
arXiv
收藏 引用
arXiv 2021年
作者: Lin, Kaizhan Wang, Weize Wang, Lin Zhao, Chang-An School of Mathematics Sun Yat-Sen University Guangzhou510275 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China Guangdong Key Laboratory of Information Security Guangzhou510006 China
Currently, public-key compression of supersingular isogeny Diffie-Hellman (SIDH) and its variant, supersingular isogeny key encapsulation (SIKE) involve pairing computation and discrete logarithm computation. In this ... 详细信息
来源: 评论
An Invocation Chain Test and Evaluation Method Based on Knowledge Graph
An Invocation Chain Test and Evaluation Method Based on Know...
收藏 引用
2020 International Conference on Networking and Network Applications, NaNA 2020
作者: Zhao, Yue Yang, Yarang Tian, Bo Zhang, Tianle Science and Technology on Communication Security Laboratory Chengdu610041 China College of Physics and Electrical Engineering Kashi University Kashi844006 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
The paper, on basis of the software vulnerability description specification, works out the vulnerability knowledge base for vulnerability combination, completes the specification modeling of target environment informa... 详细信息
来源: 评论
Attribute-Based Policy-Hiding Redactable Blockchain With Authorizable Verification for Energy Internet
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xue, Jingting Liu, Liang Li, Fagen Jing, Ximin Zhang, Wenzheng Zhang, Xiaojun Zhou, Yu Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu610500 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute of Southwestern Communication Science and Technology on Communication Security Laboratory Chengdu610041 China
The goal of the energy internet is to enable communication between distributed energy endpoints to facilitate information exchange and trading matching. Blockchain, which ensures content consistency, bridges the gaps ... 详细信息
来源: 评论
The cryptographic properties of the autocorrelation functions for encryption algorithm
The cryptographic properties of the autocorrelation function...
收藏 引用
International Conference on Mechatronics and Intelligent Robotics, ICMIR 2018
作者: Zhou, Yu Zhang, Aili Cao, Yunfei Science and Technology on Communication Security Laboratory Chengdu610041 China Xinxiang453007 China
The security for this Wireless sensor is important, and it is estimated by encryption algorithm. The basic component (named Boolean function) with encryption algorithm is studied, and we obtain the sum of high-order a... 详细信息
来源: 评论
Sending-or-not-sending twin-field quantum key distribution with multiphoton states
收藏 引用
Physical Review A 2021年 第6期104卷 062441-062441页
作者: Jun Teng Zhen-Qiang Yin Guan-Jie Fan-Yuan Feng-Yu Lu Rong Wang Shuang Wang Wei Chen Wei Huang Bing-Jie Xu Guang-Can Guo Zheng-Fu Han CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei 230026 People's Republic of China Synergetic Innovation Center of Quantum Information and Quantum Physics University of Science and Technology of China Hefei Anhui 230026 People's Republic of China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu Sichuan 610041 China State Key Laboratory of Cryptography P.O. Box 5159 Beijing 100878 People's Republic of China
The twin-field quantum key distribution (TF-QKD) protocol has led to extensive investigation for its capacity of overcoming the rate-distance limit. One variant for TF-QKD named sending-or-not-sending (SNS) TF-QKD has... 详细信息
来源: 评论
Practical security analysis of a continuous-variable quantum random-number generator with a noisy local oscillator
收藏 引用
Physical Review A 2020年 第1期102卷 012422-012422页
作者: Weinan Huang Yichen Zhang Ziyong Zheng Yang Li Bingjie Xu Song Yu State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing 100876 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu 610041 China
A quantum random-number generator (QRNG) can theoretically generate unpredictable random numbers with perfect devices and is an ideal and secure source of random numbers for cryptography. However, the practical implem... 详细信息
来源: 评论
Randomness quantification for quantum random number generation based on detection of amplified spontaneous emission noise
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Jie Fan, Fan Liu, Jinlu Su, Qi Li, Yang Huang, Wei Xu, Bingjie Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Cryptology Beijing100878 China
The amplified spontaneous emission (ASE) noise has been extensively studied and employed to build quantum random number generators (QRNGs). While the previous relative works mainly focus on the realization and verific... 详细信息
来源: 评论
Realizing downstream access network using continuous-variable quantum key distribution
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Yundi Shen, Tao Wang, Xiangyu Chen, Ziyang Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronics Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
Quantum key distribution (QKD) which enables the secure distribution of symmetric keys between two legitimate parties is of great importance in future network security. Access network that connects multiple end-users ... 详细信息
来源: 评论