×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [39]
武汉大学 [27]
北京航空航天大学 [12]
北京大学 [11]
大连理工大学 [10]
清华大学 [8]
更多...
内容类型
期刊论文 [134]
会议论文 [27]
其他 [6]
学位论文 [5]
会议 [2]
发表日期
2019 [4]
2018 [7]
2017 [22]
2016 [11]
2015 [11]
2014 [14]
更多...
学科主题
Computer S... [1]
Computer S... [1]
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共174条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:57/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
A novel chaotic system and its application in a color image cryptosystem
期刊论文
OPTICS AND LASERS IN ENGINEERING, 2019, 卷号: 121, 页码: 479-494
作者:
Wang, Mingxu
;
Wang, Xingyuan
;
Zhang, Yingqian
;
Zhou, Shuang
;
Zhao, Tingting
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2019/12/02
Chaotic system
Power-exponential structure
Color image cryptosystem
Confusion and diffusion
Security analysis
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
期刊论文
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 卷号: 16, 期号: 3
作者:
Tang, Zhenjun
;
Xu, Shijie
;
Ye, Dengpan
;
Wang, Jinyan
;
Zhang, Xianquan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
Reversible data hiding
Homomorphic cryptosystem
Additive homomorphism
Histogram shifting
Real-time application
An Efficient and Secure Smart Card Based Authentication Scheme
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 4, 页码: 1113-1123
作者:
Chen, Chien-Ming
;
Xiang, Bin
;
Wang, King-Hang
;
Zhang, Yong
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Authentication key agreement
Biometric
Elliptic-curve cryptosystem
Smart card
BAN logic
Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 卷号: 13, 期号: 2, 页码: 1100-1123
作者:
Han, Mu[1]
;
Wang, Yunwen[2]
;
Ma, Shidian[3]
;
Wan, Ailan[4]
;
Liu, Shuai[5]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/24
QD-MDPC code
McEliece cryptosystem
DPA attack
Masking scheme
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
期刊论文
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6, 页码: 1705-1715
作者:
Zhang, HuanGuo
;
Liang, XiaoYan
;
Wu, WanQing
;
Cai, QingYu
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2018/08/15
Quantum Cryptography
Quantum Public Key Cryptosystem
Ciphertext Indistinguishability
Chosen Plaintext Attack
Holevo's Theorem
Bell States
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes-Vanstone elliptic curve cryptosystem
期刊论文
CHINESE PHYSICS B, 2018, 卷号: 27
作者:
Liu, Zeyu[1]
;
Xia, Tiecheng[2]
;
Wang, Jinbo[3]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/24
chaos
fractional two-dimensional triangle function combination discrete chaotic map
image encryption
Menezes-Vanstone elliptic curve cryptosystem
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks
期刊论文
Information Sciences, 2018, 卷号: Vol.451-452, 页码: 1-15
作者:
Jing Zhang
;
Jie Cui
;
Yan Xu
;
Runhua Shi
;
Hong Zhong
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/22
Vehicular
ad
hoc
networks
Certificateless
public
key
cryptography
Aggregate
signature
Elliptic
curve
cryptosystem
Privacy
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
期刊论文
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6
作者:
Wu, WanQing
;
Cai, QingYu
;
Zhang, HuanGuo
;
Liang, XiaoYan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Quantum cryptography
Quantum public key cryptosystem
Ciphertext indistinguishability
Chosen plaintext attack
Holevo's theorem
Bell states
Structural Key Recovery of Simple Matrix Encryption Scheme Family
期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 12
作者:
Liu, Jinhui
;
Yu, Yong
;
Yang, Bo
;
Jia, Jianwei
;
Wang, Shijia
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
post-quantum cryptography
multivariate public-key cryptosystem
linearization equations attack
linear equations solving
computational complexity
©版权所有 ©2017 CSpace - Powered by
CSpace