咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 84 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 37 篇 信息与通信工程
    • 29 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 13 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 8 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 7 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 106 篇 理学
    • 60 篇 物理学
    • 49 篇 数学
    • 20 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 3 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 6 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 passive optical ...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 privacy protecti...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 matrix algebra
  • 2 篇 blockchain
  • 2 篇 field programmab...

机构

  • 76 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 9 篇 zhang wenzheng

语言

  • 170 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
177 条 记 录,以下是31-40 订阅
排序:
Monitoring the source noise of a plug-and-play continuous variable quantum key distribution system  10
Monitoring the source noise of a plug-and-play continuous va...
收藏 引用
Quantum and Nonlinear Optics X 2023
作者: Shao, Yun Pan, Yan Wang, Heng Pi, Yaodi Ye, Ting Liu, Jinlu Li, Yang Huang, Wei Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
The source noise in plug-and-play continuous variable quantum key distribution (CV-QKD) system plays a crucial role in determining the secret key rate and transmission distance. In general, the source noise is conside... 详细信息
来源: 评论
A New Scheme for Orthogonal Dual-Polarization Continuous-Variable Quantum Key Distribution  10
A New Scheme for Orthogonal Dual-Polarization Continuous-Var...
收藏 引用
Quantum and Nonlinear Optics X 2023
作者: Zhang, Shuai Pan, Yan Wang, Heng Shao, Yun Zhang, Tao Liu, Jinlu Pi, Yaodi Huang, Wei Li, Yang Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
In this article, we propose a pilot alternately assisted scheme of orthogonal dual-polarization and time multiplexing for the local local oscillator continuous-variable quantum key distribution (LLO CV-QKD). Our schem... 详细信息
来源: 评论
Simple and Fast Polarization Tracking algorithm for Continuous-Variable Quantum Key Distribution System
Simple and Fast Polarization Tracking algorithm for Continuo...
收藏 引用
2023 Optical Fiber communications Conference and Exhibition, OFC 2023
作者: Pan, Yan Wang, Heng Shao, Yun Pi, Yaodi Ye, Ting Li, Yang Huang, Wei Xu, Bingjie Institute of Southwestern Communication Science and Technology on Communication Security Laboratory Chengdu610041 China
A simple and fast polarization tracking algorithm for pilot tone-assisted CV-QKD system is demonstrated. Experimental results show that the proposed algorithm can track polarization scrambling rate ≥12.57 krad/s with... 详细信息
来源: 评论
25 MHz repetition rate pilot-tone-assisted Gaussian-modulated continuous-variable quantum key distribution with a local local oscillator  19
25 MHz repetition rate pilot-tone-assisted Gaussian-modulate...
收藏 引用
19th International Conference on Optical communications and Networks, ICOCN 2021
作者: Wang, Heng Pi, Yaodi Shao, Yun Pan, Yan Huang, Wei Li, Yang Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
We experimentally demonstrate a 25 MHz repetition rate pilot-tone-assisted Gaussian-modulated continuous-variable quantum key distribution (CVQKD) with a local local oscillator (LLO) by employing the frequency-multipl... 详细信息
来源: 评论
The cryptographic properties of the autocorrelation functions for encryption algorithm
The cryptographic properties of the autocorrelation function...
收藏 引用
International Conference on Mechatronics and Intelligent Robotics, ICMIR 2018
作者: Zhou, Yu Zhang, Aili Cao, Yunfei Science and Technology on Communication Security Laboratory Chengdu610041 China Xinxiang453007 China
The security for this Wireless sensor is important, and it is estimated by encryption algorithm. The basic component (named Boolean function) with encryption algorithm is studied, and we obtain the sum of high-order a... 详细信息
来源: 评论
Zeta-Functions of Curves of Genus 3 over Finite Fields
收藏 引用
Acta Mathematica Sinica,English Series 2010年 第11期26卷 2223-2230页
作者: Fei YU Hong Xi TONG Science and Technology on Communication Security Laboratory Chengdu 610041 P. R. China Department of Mathematics Shanghai University Shanghai 200444 P. R. China
In this paper, we determine zeta-functions of some curves of genus 3 over finite fields by gluing three elliptic curves based on Xing's research, and the examples show that there exists a maximal curve of genus 3 ove... 详细信息
来源: 评论
Searching short recurrences of nonlinear shift registers via directed acyclic graphs  7
Searching short recurrences of nonlinear shift registers via...
收藏 引用
7th China International Conference on Information security and Cryptography, Inscrypt 2011
作者: Wang, Lin Shen, Bing Qiao, Tongxu Science and Technology on Communication Security Laboratory Chengdu 610041 Sichuan China No.30 Institute of CETC Chengdu 610041 Sichuan China
Finding a recurrence of a shift register gives its equivalent shift register in Fibonacci configuration and hence helps to decide whether different nonlinear shift registers are equivalent, i.e., whether they generate... 详细信息
来源: 评论
The security Analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel
收藏 引用
Chinese Physics Letters 2015年 第8期32卷 1-5页
作者: 李剑 孙风琪 潘泽世 聂金瑞 陈彦桦 袁开国 School of Computer Beijing University of Posts and Telecommunications Beijing 100876 Hefei National Laboratory for Physical Sciences at the Microscale University of Science and Technology of China Hefei 230026 Scienee and Technology on Communication Security Laboratory Chengdu 610041
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... 详细信息
来源: 评论
A Unified Trust Service Scheme for Heterogeneous Identity Alliance
A Unified Trust Service Scheme for Heterogeneous Identity Al...
收藏 引用
2020 International Conference on Networking and Network Applications, NaNA 2020
作者: Dong, Guishan Chen, Yuxiang Hao, Yao Jian, Bai Zhang, Zhaolei Sijie, Liao China Electronics Technology Cyber Security Co. Ltd China Science and Technology on Communication Security Laboratory Chengdu610041 China
With the development of network technology, there exists large number of identity management systems with different architectures and different application areas in cyberspace. How to manage various network identities... 详细信息
来源: 评论
High-rate discrete-modulated continuous-variable quantum key distribution with composable security
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Mingze Pan, Yan Li, Junhui Wang, Heng Fan, Lu Shao, Yun Li, Yang Huang, Wei Yu, Song Xu, Bingjie Zhang, Yichen Yang, Jie Pi, Yaodi Ye, Ting Sun, Ao Jiang, Lin Yan, Lianshan Pan, Wei National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Center for Information Photonics & Communications School of Information Science and Technology Southwest Jiaotong University Sichuan Chengdu611756 China
Discrete modulation represents a practical and device-friendly solution for high speed transmission in continuous-variable quantum key distribution (CV-QKD), offering high compatibility with coherent optical communica... 详细信息
来源: 评论