咨询与建议

限定检索结果

文献类型

  • 55 篇 会议
  • 50 篇 期刊文献

馆藏范围

  • 105 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 64 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 20 篇 网络空间安全
    • 11 篇 信息与通信工程
    • 6 篇 安全科学与工程
    • 5 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电气工程
    • 2 篇 环境科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
  • 23 篇 理学
    • 15 篇 数学
    • 8 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 2 篇 系统科学
    • 1 篇 化学
    • 1 篇 大气科学
  • 12 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 11 篇 军事学
    • 11 篇 军队指挥学
  • 4 篇 法学
    • 3 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 7 篇 cryptography
  • 5 篇 authentication
  • 4 篇 block cipher
  • 3 篇 public key crypt...
  • 3 篇 fault analysis
  • 3 篇 trusted computin...
  • 2 篇 standard model
  • 2 篇 random fault mod...
  • 2 篇 deep learning
  • 2 篇 side channel att...
  • 2 篇 learning algorit...
  • 2 篇 search engines
  • 2 篇 recurrent neural...
  • 2 篇 side-channel att...
  • 2 篇 visualization
  • 2 篇 costs
  • 2 篇 tpm
  • 2 篇 benchmarking
  • 2 篇 hash functions
  • 2 篇 security

机构

  • 67 篇 trusted computin...
  • 24 篇 university of ch...
  • 9 篇 guangxi key labo...
  • 9 篇 state key labora...
  • 7 篇 state key labora...
  • 6 篇 state key labora...
  • 4 篇 trusted computin...
  • 4 篇 department of ec...
  • 4 篇 china industrial...
  • 4 篇 institute of com...
  • 3 篇 computer school ...
  • 3 篇 department of co...
  • 2 篇 cryptography and...
  • 2 篇 state key lab. o...
  • 2 篇 trusted computin...
  • 2 篇 tsinghua univers...
  • 2 篇 state key labora...
  • 2 篇 qingdao univerci...
  • 2 篇 trusted computin...
  • 2 篇 international sc...

作者

  • 17 篇 feng dengguo
  • 10 篇 wu wenling
  • 10 篇 dengguo feng
  • 8 篇 zhenfeng zhang
  • 7 篇 zhang zhenfeng
  • 6 篇 zhang min
  • 6 篇 chen hua
  • 6 篇 qin yu
  • 4 篇 zhang lei
  • 4 篇 xu jing
  • 4 篇 zhang yingjun
  • 4 篇 min zhang
  • 4 篇 shao jianxiong
  • 4 篇 hua chen
  • 4 篇 fan limin
  • 4 篇 feng jingyi
  • 3 篇 jiang zhang
  • 3 篇 zhu shaofeng
  • 3 篇 gao si
  • 3 篇 min yan

语言

  • 100 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"机构=Trusted Computing and Information Assurance Laboratory Institute of Software"
105 条 记 录,以下是1-10 订阅
排序:
Quantum IND-CPA Security Notions for AEAD  16th
Quantum IND-CPA Security Notions for AEAD
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Zhang, Mengyuan Wu, Wenling Sui, Han Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Indistinguishability under chosen plaintext attack (IND-CPA) is a crucial security notion for assessing the confidentiality of encryption algorithms. Unlike in the classical scenario, this notion is more diverse in th... 详细信息
来源: 评论
A distributed machine learning dynamic remote proof scheme that resists collusion attacks  4
A distributed machine learning dynamic remote proof scheme t...
收藏 引用
4th International Conference on Network Communication and information Security, ICNCIS 2024
作者: Wang, Ke Wu, Qiuxin Qin, Yu School of Applied Science Beijing Information Science and Technology University Beijing100192 China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Science Beijing100190 China
Based on the security of distributed machine learning data and model based on remote proof, a cross-domain dynamic remote proof scheme based on ring signature improves the efficiency of computer cluster proof, the app... 详细信息
来源: 评论
Statically-Directed Dynamic Taint Analysis
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 18-24页
作者: Kai Chen Yingjun Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
Taint analysis is a popular method in software analysis field including vulnerability/malware analysis. By identifying taint source and making suitable taint propagation rules, we could directly know whether variables...
来源: 评论
Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers
收藏 引用
Chinese Journal of Electronics 2015年 第2期24卷 343-348页
作者: ZHANG Lei WU Wenling Trusted Computing and Information Assurance Laboratory Institute of Software State Key Laboratory of Computer Science Institute of Software
We propose improved differential and linear active S-boxes search techniques for Feistel type ciphers. We give a uniform representation of Feistel type structures which can benefit the analysis of differential propaga... 详细信息
来源: 评论
Trajectory-user linking via supervised encoding
Security and Safety
收藏 引用
Security and Safety 2025年 第1期 10-27页
作者: Chengrui Hu Zheng Li Siyuan Wu Bowen Shu Min Zhang Hao Li Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences CISPA Helmholtz Center for Information Security
With the explosive growth of Location-Based Services(LBS),a substantial amount of geolocation data,containing end-user private information,is amassed,posing severe privacy ***-User Linking(TUL) is a trajectory mining ...
来源: 评论
Fault Analysis on a New Block Cipher DBlock with at Most Two Fault Injections
收藏 引用
Chinese Journal of Electronics 2018年 第6期27卷 1277-1282页
作者: FENG Jingyi CHEN Hua GAO Si CAO Weiqiong FAN Limin ZHU Shaofeng Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences
DBlock is a new family of block ciphers proposed by Wu et al. in Science China in 2015, which consists of three variants specified as DBlock-128/192/***-n employs a 20-round Feistel-type structure with n-bit block siz... 详细信息
来源: 评论
Formal analysis of TPM2.0 key management APIs
收藏 引用
Chinese Science Bulletin 2014年 第32期59卷 4210-4224页
作者: Qianying Zhang Shijun Zhao Yu Qin Dengguo Feng Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences
The trusted platform module(TPM),a system component implemented on physical resources,is designed to enable computers to achieve a higher level of security than the security level that it is possible to achieve by sof... 详细信息
来源: 评论
Diffusion and Security Evaluation of Feistel-PG
收藏 引用
Chinese Journal of Electronics 2017年 第4期26卷 734-739页
作者: WANG Yanfeng WU Wenling ZHANG Lei Trusted Computing and Information Assurance Laboratory Institute of Software Graduate University of Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software
Feistel-PG structure is a new specific Generalized Feistel structure(GFS) adopted in DBlock and LHash. Its main feature is adding a sbox-size permutation before the round function. Different choices of the permutation... 详细信息
来源: 评论
Free-space Continuous-variable Quantum Secret Sharing
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Fangli Chang, Liang Qiu, Daowen Pan, Minghua Xiong, Wanjun Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Free-space quantum cryptography has the potential to enable global quantum communication. However, most existing continuous-variable quantum secret sharing (CV-QSS) schemes rely on fiber channels. In this paper, we pr... 详细信息
来源: 评论
Universally composable anonymous password authenticated key exchange
收藏 引用
Science China(information Sciences) 2017年 第5期60卷 153-168页
作者: Xuexian HU Jiang ZHANG Zhenfeng ZHANG Jing XU Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Science and Technology on Information Assurance Laboratory State Key Laboratory of Cryptology
Anonymous password authenticated key exchange(APAKE) is an important cryptographic primitive, through which a client holding a password can establish a session key with a server both authentically and anonymously. Alt... 详细信息
来源: 评论