CSpace

Browse/Search Results:  1-10 of 11 Help

Selected(0)Clear Items/Page:    Sort:
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 40
Authors:  Chen Yu-Ao;  Gao Xiao-Shan
Favorite  |  View/Download:82/0  |  Submit date:2021/04/26
Block cipher AES  Boolean equation solving  condition number  hash function SHA-3  Keccak  HHL algorithm  MPKC  polynomial system solving  quantum algorithm  stream cipher Trivum  
Involutory differentially 4-uniform permutations from known constructions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
Authors:  Fu, Shihui;  Feng, Xiutao
Favorite  |  View/Download:115/0  |  Submit date:2019/03/05
Involution  Differentially 4-uniform permutation  Nonlinearity  Permutation  Algebraic degree  06E30  14G50  94A60  
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme 期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
Authors:  Lin, Zhuosheng;  Yu, Simin;  Feng, Xiutao;  Lu, Jinhu
Favorite  |  View/Download:96/0  |  Submit date:2019/12/13
Chaotic stream cipher  divide-and-conquer attack  chosen-ciphertext attack  improved chaotic encryption algorithm  
Solving polynomial systems with noise over F-2: Revisited 期刊论文
THEORETICAL COMPUTER SCIENCE, 2017, 卷号: 676, 页码: 52-68
Authors:  Huang, Zhenyu;  Lin, Dongdai
Favorite  |  View/Download:84/0  |  Submit date:2018/07/30
Boolean polynomial system with noise  Max-PoSSo  ISBS method  Cold Boot attack  Serpent  
On the cryptanalysis of Fridrich's chaotic image encryption scheme 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 132, 页码: 150-154
Authors:  Xie, Eric Yong;  Li, Chengqing;  Yu, Simin;  Lu, Jinhu
Favorite  |  View/Download:109/0  |  Submit date:2018/07/30
Chaotic encryption  Chosen-ciphertext attack  Cryptanalysis  Differential attack  
Fault Attack on the Authenticated Cipher ACORN v2 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2017, 页码: 16
Authors:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
Favorite  |  View/Download:62/0  |  Submit date:2018/07/30
Solving Boolean equation systems and applications in cryptanalysis 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2016, 卷号: 59, 期号: 5, 页码: 2
Authors:  Gao, Xiaoshan;  Huang, Zhenyu
Favorite  |  View/Download:80/0  |  Submit date:2018/07/30
solvingbooleanequationsystemsandapplicationsincryptanalysis 期刊论文
sciencechinainformationsciences, 2016, 卷号: 59, 期号: 5, 页码: 2
Authors:  Gao Xiaoshan;  Huang Zhenyu
Favorite  |  View/Download:65/0  |  Submit date:2020/01/10
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme 期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 卷号: 25, 期号: 2, 页码: 619-631
Authors:  Tan, Zuo-Wen;  Liu, Zhuo-Jun
Favorite  |  View/Download:54/0  |  Submit date:2018/07/30
proxy signature  threshold signature  forgery attack  universally forgeable  random oracle model  DL assumption  
A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2008, 卷号: 21, 期号: 2, 页码: 191-208
Authors:  Chai, Fengjuan;  Gao, Xiao-Shan;  Yuan, Chunming
Favorite  |  View/Download:77/0  |  Submit date:2018/07/30
Boolean equation  characteristic set method  cryptanalysis  finite field  stream ciphers