×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [57]
华南理工大学 [35]
北京大学 [28]
清华大学 [26]
厦门大学 [26]
武汉大学 [23]
更多...
内容类型
期刊论文 [161]
会议论文 [73]
其他 [26]
学位论文 [20]
会议 [8]
专利 [3]
更多...
发表日期
2021 [2]
2020 [5]
2019 [7]
2018 [16]
2017 [5]
2016 [20]
更多...
学科主题
Computer S... [9]
Informatio... [2]
Telecommun... [2]
Applied [1]
Computer S... [1]
Engineerin... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共291条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 18
作者:
Li, Haoyu
;
Liu, Renzhang
;
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:59/0
  |  
提交时间:2021/06/01
Ciphertext-only attack
Compact-LWE
NIST
post-quantum cryptography
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-21
作者:
Aldabbagh, G (Aldabbagh, Ghadah)[ 1 ]
;
Alghazzawi, DM (Alghazzawi, Daniyal M.)[ 1 ]
;
Hasan, SH (Hasan, Syed Hamid)[ 1 ]
;
Alhaddad, M (Alhaddad, Mohammed)[ 1 ]
;
Malibari, A (Malibari, Areej)[ 1 ]
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/07/14
mobile learningcloud storagehybrid optical elliptic curve cryptographyadaptive tunicate slime moldencryptiondecryptionsecurity
TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN]
专利
申请日期: 2020-05-07,
作者:
Shang WL(尚文利)
;
Zeng P(曾鹏)
;
Yin L(尹隆)
;
Chen CY(陈春雨)
;
Zhao JM(赵剑明)
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/07/04
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:54/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
The Novel Efficient Dual-field FIPS Modular Multiplication
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 卷号: 14, 期号: 2, 页码: 738-756
作者:
Zhang, Tingting
;
Zhu, Junru
;
Liu, Yang
;
Chen, Fulong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/12/10
Montgomery algorithm
FIPS
Modular Multiplication
Modular Square
Dual-field
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
A KIND OF DESIGN OF KNAPSACK PUBLIC KEY CRYPTOSYSTEM BASED ON CHAOTIC SYSTEM
期刊论文
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2019, 卷号: 81, 期号: 2, 页码: 165-176
作者:
Deng, Zhijuan
;
Zhong, Shaojun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/08/22
Cryptography
Chaos
Information Security
Threshold Method
A security scheme for intelligent substation communications considering real-time performance
期刊论文
JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2019, 卷号: 7, 期号: 4
作者:
Zhang, Jie
;
Li, Jun'e
;
Chen, Xiong
;
Ni, Ming
;
Wang, Ting
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Intelligent substation
Security measures
Certificateless public key cryptography (CLPKC)
Real-time communication
IEC 62351
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
期刊论文
ELECTRONIC COMMERCE RESEARCH, 2019, 卷号: 19, 期号: 3
作者:
Yu Fajiang
;
Chen Jing
;
Xiang Yang
;
Zhu Jiacheng
;
Zhao Yangdi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/05
Remote attestation
Trusted computing
Trusted platform module (TPM)
Combined public key cryptography (CPK)
©版权所有 ©2017 CSpace - Powered by
CSpace