咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 82 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是11-20 订阅
排序:
Quantum proof and high-speed privacy amplification for quantum key distribution
收藏 引用
Physical Review Applied 2025年 第5期23卷 054004-054004页
作者: Bing-Qi Yan Jun-Bin Wu Fan Fan Bing-Jie Xu Xiao-Ling Zhang Min Gu Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education) Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter School of Physics South China Normal University Guangzhou 510006 China Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials Guangdong-Hong Kong Joint Laboratory of Quantum Matter South China Normal University Guangzhou 510006 China Quantum Science Center of Guangdong-HongKong-Macao Greater Bay Area (Guangdong) Shenzhen 518000 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu 610041 China
Privacy amplification (PA) is a vital step in the postprocessing stage of quantum key distribution, which can extract a secure key from a source partially leaked to the environment. We propose a PA scheme that uses th... 详细信息
来源: 评论
Threshold public key encryption scheme resilient against continual leakage without random oracles
收藏 引用
Frontiers of Computer science 2013年 第6期7卷 955-968页
作者: Xiujie ZHANG Chunxiang XU Wenzheng ZHANG Wanpeng LI School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how ... 详细信息
来源: 评论
Fast Decryption of Excel Document Encrypted by RC4 Algorithm  20
Fast Decryption of Excel Document Encrypted by RC4 Algorithm
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Zhang, Lijun Tan, Cheng Yu, Fei Science and Technology on Communication Security Laboratory Chengdu610041 China
In this paper, we give a fast decryption method of Excel document encrypted by RC4 algorithm. Through a detailed analysis of document storage structure and encryption process, we illustrate the inner principle of key ... 详细信息
来源: 评论
New forward-secure signature schemes with untrusted update
收藏 引用
Frontiers of Computer science 2013年 第4期7卷 536-543页
作者: Wanpeng LI Chunxiang XU Wenzheng ZHANG Shixiong ZHU Xiujie ZHANG School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
In this paper, we present two forward-secure signature schemes (FSS) with untrusted update. Our constructions use ideas from the work of Abdalla et al. [1] and Kozlov and Reyzin [2] in their forward-secure digital s... 详细信息
来源: 评论
Construction of Nonlinear Optimal Diffusion Functions over Finite Fields  8
Construction of Nonlinear Optimal Diffusion Functions over F...
收藏 引用
8th International Conference on communication and Information Processing, ICCIP 2022
作者: Shen, Bing Zhou, Yu Science and Technology on Communication Security Laboratory Chengdu610041 China
The diffusion function with large branch number is a fundamental building block in the construction of many block ciphers to achieve provable bounds against differential and linear cryptanalysis. Conventional diffusio... 详细信息
来源: 评论
An energy-efficient key agreement mechanism for underwater sensor networks  7th
An energy-efficient key agreement mechanism for underwater s...
收藏 引用
7th International Conference on IT Convergence and security, ICITCS 2017
作者: Zhao, Yue Tian, Bo Chen, Zhouguo Liu, Yiming Ding, Jianwei Science and Technology on Communication Security Laboratory Chengdu610041 China
The key agreement mechanisms are designed according to different communication links of underwater sensor networks. Combined with the underwater nodes deployment and geographic location information, the key agreement ... 详细信息
来源: 评论
New bounds on the sum-of-squares indicator
New bounds on the sum-of-squares indicator
收藏 引用
2012 7th International ICST Conference on communications and Networking in China, CHINACOM 2012
作者: Zhou, Yu Dong, Xinfeng Zhang, Wenzheng Zeng, Bing Science and Technology on Communication Security Laboratory Chengdu 610041 China
The two indicators the sum-of-squares indicator and the absoluate indicator between two different Boolean functions f and g are introduced by Yu Zhou, Min Xie, Guozhen Xiao, On the global avalanche characteristics of ... 详细信息
来源: 评论
A Privacy-Preserving Gait Recognition Scheme Under Homomorphic Encryption
A Privacy-Preserving Gait Recognition Scheme Under Homomorph...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Lin, Leyu Tian, Bo Zhao, Yue Niu, Yiru Science and Technology on Communication Security Laboratory Chengdu610041 China
In recent years, machine learning and deep neural networks have achieved remarkable results and have been widely used in different domains. Affected by COVID-19, the potential of gait feature recognition in biometric ... 详细信息
来源: 评论
Reverse analysis of Wangxin application based on android platform
Reverse analysis of Wangxin application based on android pla...
收藏 引用
2021 International Conference on Computer Application and Information security, ICCAIS 2021
作者: Shi, Yu Ni, Lulin Ji, Qingbing Science and Technology on Communication Security Laboratory Chengdu610041 China
Wangxin application is an instant messaging software launched by Alibaba Group that can support Windows, Android, and iOS operating systems, and its chat messages are stored in the local folders of smart terminals. In... 详细信息
来源: 评论
Analysis of a New Improved AES S-Box Structure  5th
Analysis of a New Improved AES S-Box Structure
收藏 引用
5th International Conference on security and Privacy in New Computing Environments, SPNCE 2022
作者: Cheng, Rong Zhou, Yu Miao, Xudong Hu, Jianyong Science and Technology on Communication Security Laboratory Chengdu610041 China
S-boxes are very important nonlinear components in symmetric ciphers and have a great role in the security of cryptographic algorithms. In algorithm design, 4-bit and 8-bit S-boxes are most commonly used. The S-box of... 详细信息
来源: 评论