咨询与建议

限定检索结果

文献类型

  • 100 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 83 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 8 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 107 篇 理学
    • 60 篇 物理学
    • 50 篇 数学
    • 20 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 6 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 public key crypt...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...

机构

  • 73 篇 science and tech...
  • 43 篇 science and tech...
  • 30 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 47 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 29 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 21 篇 yu song
  • 19 篇 pi yaodi
  • 18 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 166 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
176 条 记 录,以下是161-170 订阅
排序:
Cryptographic properties of truncated sequence generated by single cycle T-function
收藏 引用
Journal of Information and Computational science 2013年 第2期10卷 461-468页
作者: Wang, Yan Hu, Yupu Zhang, Wenzheng Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China School of Telecommunications Engineering Xidian University Xi'an 710071 China Science and Technology on Communication Security Laboratory Thirtieth Institute China Electronics Technology Group Corporation Chengdu 610041 China
Single cycle T-functions have received considerable attention recent years. The autocorrelation properties and the 2-adic complexity of the truncated sequence are investigated based on the special properties of single... 详细信息
来源: 评论
New sequences of period p n and p n + 1 via projective linear groups
收藏 引用
8th China International Conference on Information security and Cryptology, INSCRYPT 2012
作者: Wang, Lin Hu, Zhi Science and Technology on Communication Security Laboratory Chengdu 610041 Sichuan China Beijing International Center for Mathematical Research Peking University Beijing 100871 China
Two pseudorandom number generators are devised based on the projective linear group over, outputting balanced sequences on meeting some statistical randomness properties. Sequences generated by the first generator hav... 详细信息
来源: 评论
Attack on recent homomorphic encryption scheme over integers
Attack on recent homomorphic encryption scheme over integers
收藏 引用
FTRA 7th International Conference on Multimedia and Ubiquitous Engineering, MUE 2013
作者: Yang, Haomiao Kim, Hyunsung Tang, Dianhua College of Computer Science and Engineering UEST of China Chengdu 610054 China Department of Cyber Security Kyungil University Kyungpook Kyungsansi 712-701 Korea Republic of Science and Technology on Communication Security Laboratory Chengdu 610041 China
At CDCIEM 2012, Yang et al. proposed a new construction of somewhat homomorphic encryption scheme over integers, which is quite efficient in the perspective of the key size. In this paper, we present an effective latt... 详细信息
来源: 评论
Improvement of chopchop attack
Improvement of chopchop attack
收藏 引用
2nd International Conference on Information Engineering and Applications, IEA 2012
作者: Ji, Qingbing Zhang, Lijun Yu, Fei China Electronics Technology Group Corporation 30 Group Science and Technology on Communication Security Laboratory Venture Road No. 6 High-tech Development Zone Chengdu 610041 China
Wired equivalent privacy (WEP) is a security protocol in the IEEE 802.11 wireless standard. At present, three attacks are frequently exploited: chopchop attack, Korek attack, and PTW attack. The first can decrypt a pa... 详细信息
来源: 评论
A Task Scheduling Algorithm based on QoS-Driven in Cloud Computing
收藏 引用
Procedia Computer science 2013年 17卷 1162-1169页
作者: Xiaonian Wu Mengqing Deng Runlian Zhang Bing Zeng Shengyuan Zhou School of Information and Communication Guilin University of Electronic Technology Guilin 541004 China Science and Technology on Communication Security Laboratory Chengdu 610041 China
Quality of Service is an inevitable issue needing to be deal with in task scheduling of cloud computing. This paper proposes a task scheduling algorithm based on QoS-driven for cloud computing. Firstly, in order to re... 详细信息
来源: 评论
A Trust Evaluation Model for Cloud Computing
收藏 引用
Procedia Computer science 2013年 17卷 1170-1177页
作者: Xiaonian Wu Runlian Zhang Bing Zeng Shengyuan Zhou School of Information and Communication Guilin University of Electronic Technology Guilin 541004 China Science and Technology on Communication Security Laboratory Chengdu 610041 China
Trust has attracted extensive attention in social science and computer science as a solution to enhance the security of the system. This paper proposes a trust evaluation model based on D-S evidence theory and sliding... 详细信息
来源: 评论
Generation and tate pairing computation of ordinary elliptic curves with embedding degree one
Generation and tate pairing computation of ordinary elliptic...
收藏 引用
15th International Conference on Information and communications security, ICICS 2013
作者: Hu, Zhi Wang, Lin Xu, Maozhi Zhang, Guoliang Beijing International Center for Mathematical Research Peking University Beijing 100871 China LMAM School of Mathematical Sciences Peking University Beijing 100871 China Science and Technology on Communication Security Laboratory Chengdu 610041 China
We generalize Boneh-Rubin-Silverberg method [3] to construct ordinary elliptic curves with embedding degree one, which provides composite order groups for cryptographic protocols based on such bilinear groups. Our con... 详细信息
来源: 评论
Unified and Complete Point Addition Formula for Elliptic Curves
收藏 引用
电子学报(英文版) 2012年 第2期21卷 345-349页
作者: ZHANG Lijun WANG Kunpeng WANG Hong Science and Technology on Communication Security Laboratory Chengdu 610041 China State Key Laboratory of Information Security GUCAS Beijing 100049 China
As is well known, the unified point addition formula is useful for resisting side channel attacks in elliptic curve cryptography. Furthermore, if the unified formula is complete, which means it is valid for any two po... 详细信息
来源: 评论
New bounds on the sum-of-squares indicator
New bounds on the sum-of-squares indicator
收藏 引用
2012 7th International ICST Conference on communications and Networking in China, CHINACOM 2012
作者: Zhou, Yu Dong, Xinfeng Zhang, Wenzheng Zeng, Bing Science and Technology on Communication Security Laboratory Chengdu 610041 China
The two indicators the sum-of-squares indicator and the absoluate indicator between two different Boolean functions f and g are introduced by Yu Zhou, Min Xie, Guozhen Xiao, On the global avalanche characteristics of ... 详细信息
来源: 评论
Searching short recurrences of nonlinear shift registers via directed acyclic graphs  7
Searching short recurrences of nonlinear shift registers via...
收藏 引用
7th China International Conference on Information security and Cryptography, Inscrypt 2011
作者: Wang, Lin Shen, Bing Qiao, Tongxu Science and Technology on Communication Security Laboratory Chengdu 610041 Sichuan China No.30 Institute of CETC Chengdu 610041 Sichuan China
Finding a recurrence of a shift register gives its equivalent shift register in Fibonacci configuration and hence helps to decide whether different nonlinear shift registers are equivalent, i.e., whether they generate... 详细信息
来源: 评论