咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 82 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是111-120 订阅
排序:
Constructions of Vectorial Boolean Functions With Good Cryptographic Properties
Constructions of Vectorial Boolean Functions With Good Crypt...
收藏 引用
中国密码学会2017年密码算法学术会议
作者: Lu-Yang Li Wei-Guo Zhang Science and Technology on Communication Security Laboratory Chengdu 610041 State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071
Vectorial Boolean functions are used as the nonlinear components in stream *** security of the cipher system depends on the cryptographic properties of the *** widely accepted criteria are balancedness,high nonlineari... 详细信息
来源: 评论
Identification of Block Ciphers under CBC Mode
收藏 引用
Procedia Computer science 2018年 131卷 65-71页
作者: Cheng Tan Xiaoyan Deng Lijun Zhang Science and Technology on Communication Security Laboratory No. 8 of Venture Road Chengdu 610041 Sichuan Province China College of Applied Mathematics Chengdu University of Information Technology No. 24 of Xuefu Road Chengdu 610103 Sichuan Province China
It has been challenging work to identify block ciphers under CBC mode over the past few decades. But we can still conduct the identification of block ciphers under CBC mode if enough ciphertext streams are available. ... 详细信息
来源: 评论
Frequency-shifted Self-Heterodyne Measurement for Both Magnitude and Phase Response of Optical Filters
Frequency-shifted Self-Heterodyne Measurement for Both Magni...
收藏 引用
Asia communications and Photonics Conference
作者: Mengke Wang Shangjian Zhang Xinhai Zou Heng Wang Zhiyao Zhang Yali Zhang Yong Liu State Key Laboratory of Electronic Thin Films and Integrated Devices School of Optoelectronic Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China
We demonstrate a frequency-shifted self-heterodyne method for evaluating the characteristics of optical filters. The method enables simultaneously extracting the magnitude- and phase-frequency response within wide fre... 详细信息
来源: 评论
More practical power analysis attack on LFSR based stream ciphers
收藏 引用
Journal of Information and Computational science 2012年 第12期9卷 3517-3527页
作者: Jia, Yanyan Hu, Yupu Zhang, Wenzheng Department of Computer Science Xi'an University of Science and Technology Xi'an 710054 China Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
Power analysis attack is a powerful cryptanalytic technique aiming to extract the secret data from a cryptographic device by collecting and analyzing power consumption traces. In this paper, we present a practical pow... 详细信息
来源: 评论
Efficient decoy states for the reference-frame-independent measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2020年 第5期101卷 052318-052318页
作者: Feng-Yu Lu Zhen-Qiang Yin Guan-Jie Fan-Yuan Rong Wang Hang Liu Shuang Wang Wei Chen De-Yong He Wei Huang Bing-Jie Xu Guang-Can Guo Zheng-Fu Han Key Laboratory of Quantum Information CAS Center For Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Hefei 230026 China State Key Laboratory of Cryptology P. O. Box 5159 Beijing 100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu Sichuan 610041 China
Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is a novel protocol that eliminates all possible attacks on the detector side and the necessity of reference-frame alig... 详细信息
来源: 评论
Improving the performance of twin-field quantum key distribution
收藏 引用
Physical Review A 2019年 第2期100卷 022306-022306页
作者: Feng-Yu Lu Zhen-Qiang Yin Chao-Han Cui Guan-Jie Fan-Yuan Rong Wang Shuang Wang Wei Chen De-Yong He Wei Huang Bing-Jie Xu Guang-Can Guo Zheng-Fu Han Key Laboratory of Quantum Information CAS Center For Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Hefei 230026 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing 100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu Sichuan 610041 China
Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M. Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, th... 详细信息
来源: 评论
Selection of optimal architecture of rapid gradient descent method based on iterative design
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第23期6卷 381-391页
作者: Wei, Wei Shen, Peiyi Hao, Meiping Song, Juan Zhang, Liang Xu, Hu Zhang, Wenzheng Wang, Wei School of Computer Science and Engineering XI'an University of technology XI'an 710048 China National school of software Xidian University 710071 Xi'an Shaanxi China Science and Technology on Communication Security Laboratory 610041 Chengdu China
Software testing is essential to ensure that the software Quality. On most software projects testing activities consume at least 30 percent of the project effort. On safety critical applications, software testing can ... 详细信息
来源: 评论
LEACH-based energy-conserved improved protocol for WSNs
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第23期6卷 163-171页
作者: Wei, Wei Shen, Peiyi Zhang, Liang Xu, Hu Song, Juan Zhang, Wenzheng Wang, Wei School of Computer Science and Engineering XI'an University of Technology XI'an 710048 China National school of Software Xidian University 710071 Xi'an Shaanxi China Science and Technology on Communication Security Laboratory 610041 Chengdu China
In wireless sensor networks (WSNs) environment, since the battery limitation of the node energy, energy efficiency is an key factor should be considered as the communication methods are designing. As classical and hie... 详细信息
来源: 评论
Sums of polynomial-type exceptional units modulo n
arXiv
收藏 引用
arXiv 2021年
作者: Zhao, Junyong Hong, Shaofang Zhu, Chaoxi Mathematical College Sichuan University Chengdu610064 China School of Mathematics and Statistics Nanyang Institute of Technology Nanyang473004 China Science and Technology on Communication Security Laboratory Chengdu610041 China
Let f(x) ∈ Z[x] be a nonconstant polynomial. Let n, k and c be integers such that n ≥ 1 and k ≥ 2. An integer a is called an f-exunit in the ring Zn of residue classes modulo n if gcd(f(a), n) = 1. In this paper, w... 详细信息
来源: 评论
On the number of zeros to the equation f(x1)+⋯+f(xn)=a over finite fields
arXiv
收藏 引用
arXiv 2021年
作者: Zhu, Chaoxi Feng, Yulu Hong, Shaofang Zhao, Junyong Science and Technology on Communication Security Laboratory Chengdu610041 China Mathematical College Sichuan University Chengdu610064 China School of Mathematics and Statistics Nanyang Institute of Technology Nanyang473004 China
Let p be a prime, k a positive integer and let Fqbe the finite field of q = pkelements. Let f(x) be a polynomial over Fq and a ∈ Fq. We denote by Ns(f, a) the number of zeros of f(x1)+⋯+f(xs) = a. In this paper, we s... 详细信息
来源: 评论