咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 84 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 37 篇 信息与通信工程
    • 29 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 13 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 8 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 7 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 106 篇 理学
    • 60 篇 物理学
    • 49 篇 数学
    • 20 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 3 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 6 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 passive optical ...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 privacy protecti...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 matrix algebra
  • 2 篇 blockchain
  • 2 篇 field programmab...

机构

  • 76 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 9 篇 zhang wenzheng

语言

  • 170 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
177 条 记 录,以下是11-20 订阅
排序:
Unified and Complete Point Addition Formula for Elliptic Curves
收藏 引用
电子学报(英文版) 2012年 第2期21卷 345-349页
作者: ZHANG Lijun WANG Kunpeng WANG Hong Science and Technology on Communication Security Laboratory Chengdu 610041 China State Key Laboratory of Information Security GUCAS Beijing 100049 China
As is well known, the unified point addition formula is useful for resisting side channel attacks in elliptic curve cryptography. Furthermore, if the unified formula is complete, which means it is valid for any two po... 详细信息
来源: 评论
Research on privacy information retrieval model based on hybrid homomorphic encryption
收藏 引用
Cybersecurity 2024年 第4期7卷 52-61页
作者: Wei-tao Song Guang Zeng Wen-zheng Zhang Dian-hua Tang Science and Technology on Communication Security Laboratory.Chengdu 610041 China Zhejiang University Hangzhou 311200China PLA SSF Information Engineering University Zhengzhou 450000China College of Computer Science and Technology National University of Defense TechnologyChangsha 410073China
The computational complexity of privacy information retrieval protocols is often linearly related to database *** the database size is large,the efficiency of privacy information retrieval protocols is relatively *** ... 详细信息
来源: 评论
Quantum proof and high-speed privacy amplification for quantum key distribution
收藏 引用
Physical Review Applied 2025年 第5期23卷 054004-054004页
作者: Bing-Qi Yan Jun-Bin Wu Fan Fan Bing-Jie Xu Xiao-Ling Zhang Min Gu Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education) Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter School of Physics South China Normal University Guangzhou 510006 China Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials Guangdong-Hong Kong Joint Laboratory of Quantum Matter South China Normal University Guangzhou 510006 China Quantum Science Center of Guangdong-HongKong-Macao Greater Bay Area (Guangdong) Shenzhen 518000 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu 610041 China
Privacy amplification (PA) is a vital step in the postprocessing stage of quantum key distribution, which can extract a secure key from a source partially leaked to the environment. We propose a PA scheme that uses th... 详细信息
来源: 评论
Threshold public key encryption scheme resilient against continual leakage without random oracles
收藏 引用
Frontiers of Computer science 2013年 第6期7卷 955-968页
作者: Xiujie ZHANG Chunxiang XU Wenzheng ZHANG Wanpeng LI School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how ... 详细信息
来源: 评论
Fast Decryption of Excel Document Encrypted by RC4 Algorithm  20
Fast Decryption of Excel Document Encrypted by RC4 Algorithm
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Zhang, Lijun Tan, Cheng Yu, Fei Science and Technology on Communication Security Laboratory Chengdu610041 China
In this paper, we give a fast decryption method of Excel document encrypted by RC4 algorithm. Through a detailed analysis of document storage structure and encryption process, we illustrate the inner principle of key ... 详细信息
来源: 评论
New forward-secure signature schemes with untrusted update
收藏 引用
Frontiers of Computer science 2013年 第4期7卷 536-543页
作者: Wanpeng LI Chunxiang XU Wenzheng ZHANG Shixiong ZHU Xiujie ZHANG School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
In this paper, we present two forward-secure signature schemes (FSS) with untrusted update. Our constructions use ideas from the work of Abdalla et al. [1] and Kozlov and Reyzin [2] in their forward-secure digital s... 详细信息
来源: 评论
Construction of Nonlinear Optimal Diffusion Functions over Finite Fields  8
Construction of Nonlinear Optimal Diffusion Functions over F...
收藏 引用
8th International Conference on communication and Information Processing, ICCIP 2022
作者: Shen, Bing Zhou, Yu Science and Technology on Communication Security Laboratory Chengdu610041 China
The diffusion function with large branch number is a fundamental building block in the construction of many block ciphers to achieve provable bounds against differential and linear cryptanalysis. Conventional diffusio... 详细信息
来源: 评论
An energy-efficient key agreement mechanism for underwater sensor networks  7th
An energy-efficient key agreement mechanism for underwater s...
收藏 引用
7th International Conference on IT Convergence and security, ICITCS 2017
作者: Zhao, Yue Tian, Bo Chen, Zhouguo Liu, Yiming Ding, Jianwei Science and Technology on Communication Security Laboratory Chengdu610041 China
The key agreement mechanisms are designed according to different communication links of underwater sensor networks. Combined with the underwater nodes deployment and geographic location information, the key agreement ... 详细信息
来源: 评论
New bounds on the sum-of-squares indicator
New bounds on the sum-of-squares indicator
收藏 引用
2012 7th International ICST Conference on communications and Networking in China, CHINACOM 2012
作者: Zhou, Yu Dong, Xinfeng Zhang, Wenzheng Zeng, Bing Science and Technology on Communication Security Laboratory Chengdu 610041 China
The two indicators the sum-of-squares indicator and the absoluate indicator between two different Boolean functions f and g are introduced by Yu Zhou, Min Xie, Guozhen Xiao, On the global avalanche characteristics of ... 详细信息
来源: 评论
A Privacy-Preserving Gait Recognition Scheme Under Homomorphic Encryption
A Privacy-Preserving Gait Recognition Scheme Under Homomorph...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Lin, Leyu Tian, Bo Zhao, Yue Niu, Yiru Science and Technology on Communication Security Laboratory Chengdu610041 China
In recent years, machine learning and deep neural networks have achieved remarkable results and have been widely used in different domains. Affected by COVID-19, the potential of gait feature recognition in biometric ... 详细信息
来源: 评论