咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 82 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是151-160 订阅
排序:
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
An error-tolerant keyword search scheme based on public-key ...
收藏 引用
作者: Bo, Yang Zhang, Mingwu Du, Jun-Qiang School of Computer Science Shaanxi Normal University Xi'an710119 China Science and Technology on Communication Security Laboratory Chengdu610041 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer Sciences Hubei University of Technology Wuhan430068 China
An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly matc... 详细信息
来源: 评论
On the Derivative Imbalance and Ambiguity of Functions
arXiv
收藏 引用
arXiv 2017年
作者: Fu, Shihui Feng, Xiutao Wang, Qiang Carlet, Claude KLMM Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Science and Technology on Communication Security Laboratory Chengdu610041 China School of Mathematics and Statistics Carleton University OttawaONK1S 5B6 Canada LAGA University of Paris 8 FRANCE University of Bergen Saint-Denis Cedex 02 Norway
In 2007, Carlet and Ding introduced two parameters, denoted by NbF and NBF, quantifying respectively the balancedness of general functions F between finite Abelian groups and the (global) balancedness of their derivat... 详细信息
来源: 评论
Non-Gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution
收藏 引用
Physical Review A 2016年 第1期93卷 012310-012310页
作者: Zhengyu Li Yichen Zhang Xiangyu Wang Bingjie Xu Xiang Peng Hong Guo State Key Laboratory of Advanced Optical Communication Systems and Networks Center for Computational Science and Engineering and Center for Quantum Information Technology School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu 610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing 100876 China
Photon subtraction can enhance the performance of continuous-variable quantum key distribution (CV QKD). However, the enhancement effect will be reduced by the imperfections of practical devices, especially the limite... 详细信息
来源: 评论
Comment on “Quantum oblivious set-member decision protocol”
收藏 引用
Physical Review A 2016年 第3期93卷 036301-036301页
作者: Bin Liu Di Xiao Wei Huang Ting-Ting Song Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) of Ministry of Education College of Computer Science Chongqing University Chongqing 400044 China Science and Technology on Communication Security Laboratory Chengdu 610041 China Department of Computer Science College of Information Science and Technology Jinan University Guangzhou 510632 China
In a recent paper [Phys. Rev. A 92, 022309 (2015)], the authors proposed a quantum oblivious set-member decision protocol, which is designed to allow a server to check whether a private secret of a user is a member of... 详细信息
来源: 评论
The security Analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel
收藏 引用
Chinese Physics Letters 2015年 第8期32卷 1-5页
作者: 李剑 孙风琪 潘泽世 聂金瑞 陈彦桦 袁开国 School of Computer Beijing University of Posts and Telecommunications Beijing 100876 Hefei National Laboratory for Physical Sciences at the Microscale University of Science and Technology of China Hefei 230026 Scienee and Technology on Communication Security Laboratory Chengdu 610041
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... 详细信息
来源: 评论
Fluctuating Power Logic (FPL): A constructive SCA resistant scheme at transistor level
Fluctuating Power Logic (FPL): A constructive SCA resistant ...
收藏 引用
2016年密码芯片学术会议
作者: Fan Zhang Liang Geng Congyuan Xu Jizhong Shen Xinjie Zhao Shize Guo College of Information Science & Electronic Engineering Zhejiang UniversityHangzhou 310027 China College of Information Science & Electronic Engineering Zhejiang UniversityHangzhou 310027 China Science and Technology on Communication Security Laboratory Chengdu 610041China The Institute of North Electronic Equipment Beijing 100000 China
Hiding and masking are two mainstream countermeasures against side channel analysis (SCA) at cell *** power analysis, both rely on the fact that variant data transitions consume more distinguishable power than invaria... 详细信息
来源: 评论
Threshold public key encryption scheme resilient against continual leakage without random oracles
收藏 引用
Frontiers of Computer science 2013年 第6期7卷 955-968页
作者: Xiujie ZHANG Chunxiang XU Wenzheng ZHANG Wanpeng LI School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how ... 详细信息
来源: 评论
New forward-secure signature schemes with untrusted update
收藏 引用
Frontiers of Computer science 2013年 第4期7卷 536-543页
作者: Wanpeng LI Chunxiang XU Wenzheng ZHANG Shixiong ZHU Xiujie ZHANG School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
In this paper, we present two forward-secure signature schemes (FSS) with untrusted update. Our constructions use ideas from the work of Abdalla et al. [1] and Kozlov and Reyzin [2] in their forward-secure digital s... 详细信息
来源: 评论
The autocorrelation distribution of balanced Boolean function
收藏 引用
Frontiers of Computer science 2013年 第2期7卷 272-278页
作者: Yu ZHOU Weiguo ZHANG Juan LI Xinfeng DONG Guozhen XIAO Science and Technology on Communication Security Laboratory China Chengdu 610041 State Key Laboratory of Integrated Service Networks Xidian UniversityChina Xi'an 710071 Foreign Language Department Emei Campus Southwest Jiaotong University China Emei 614202 State Key Laboratory of Information Security Chinese Academy of SciencesChina Beijing 100093
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower ... 详细信息
来源: 评论
New sequences of period p n and p n + 1 via projective linear groups
收藏 引用
8th China International Conference on Information security and Cryptology, INSCRYPT 2012
作者: Wang, Lin Hu, Zhi Science and Technology on Communication Security Laboratory Chengdu 610041 Sichuan China Beijing International Center for Mathematical Research Peking University Beijing 100871 China
Two pseudorandom number generators are devised based on the projective linear group over, outputting balanced sequences on meeting some statistical randomness properties. Sequences generated by the first generator hav... 详细信息
来源: 评论