CORC

浏览/检索结果: 共36条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Analysis and improvement of a provable secure fuzzy identity-based signature scheme 期刊论文
Science China Information Sciences, 2014, 卷号: 57, 期号: 9, 页码: 1-5
Xiong, Hu (1); Chen, YaNan (4); Zhu, GuoBin (1); Qin, ZhiGuang (1)
收藏  |  浏览/下载:24/0  |  提交时间:2014/12/16
A secure and efficient certificateless aggregate signature scheme 期刊论文
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2014, 卷号: E97-A, 期号: 4, 页码: 991-995
Liu, He (1); Liang, Mangui (1); Sun, Haoliang (2)
收藏  |  浏览/下载:31/0  |  提交时间:2014/12/16
对ECC算法实现的选择明文攻击方法 期刊论文
通信学报, 2014, 卷号: 35, 期号: 5, 页码: 79-87
罗鹏; 李慧云; 王鲲鹏; 王亚伟
收藏  |  浏览/下载:12/0  |  提交时间:2014/12/16
An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments 期刊论文
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 卷号: 38, 期号: 8, 页码: 2055-2061
He, Debiao; Chen, Yitao; Chen, Jianhua
收藏  |  浏览/下载:13/0  |  提交时间:2014/12/16
efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Liu Shengli; Weng Jian; Zhao Yunlei
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
on enumeration of polynomial equivalence classes 会议论文
SCIENCE CHINA Mathematics
Wang TianZe; Lin DongDai
收藏  |  浏览/下载:8/0  |  提交时间:2013/09/22
group key agreement for secure group communication in dynamic peer systems 期刊论文
Journal of Parallel and Distributed Computing, 2012, 卷号: 72, 期号: 10, 页码: 1195-1200
Lv Xixiang; Li Hui; Wang Baocang
收藏  |  浏览/下载:14/0  |  提交时间:2012/11/12
群组密钥协商协议的设计与分析 学位论文
博士, 北京: 中国科学院研究生院, 2011
滕济凯
收藏  |  浏览/下载:20/0  |  提交时间:2012/01/05
identity-based key distribution for mobile ad hoc networks 期刊论文
Frontiers of Computer Science in China, 2011, 卷号: 5, 期号: 4, 页码: 442-447
Lv Xixiang; Li Hui; Wang Baocang
收藏  |  浏览/下载:15/0  |  提交时间:2013/10/08
simple power analysis attacks using chosen message against ecc hardware implementations 会议论文
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun; Wu Keke; Xu Guoqing; Yuan Hai; Luo Peng
收藏  |  浏览/下载:22/0  |  提交时间:2011/10/10


©版权所有 ©2017 CSpace - Powered by CSpace