×
验证码:
换一张
Forgotten Password?
Stay signed in
China Science and Technology Network Pass Registration
×
China Science and Technology Network Pass Registration
Log In
Chinese
|
English
中国科学院数学与系统科学研究院机构知识库
KMS Of Academy of mathematics and systems sciences, CAS
Log In
Register
ALL
ORCID
Title
Creator
Date Issued
Subject Area
Keyword
Document Type
Source Publication
Date Accessioned
Indexed By
Publisher
Funding Project
MOST Discipline Catalogue
Study Hall
Image search
Paste the image URL
Home
Collections
Authors
DocType
Subjects
K-Map
News
Search in the results
Collection
Institute ... [8]
Authors
Gao Xiaosh... [3]
Lv Jinhu [3]
Feng Xiuta... [3]
Yuan Chunm... [1]
Document Type
Journal a... [11]
Date Issued
2021 [1]
2019 [1]
2018 [1]
2017 [3]
2016 [2]
2009 [1]
More...
Language
英语 [11]
Source Publication
JOURNAL OF... [2]
CHAOS [1]
DESIGNS CO... [1]
INTERNATIO... [1]
JOURNAL OF... [1]
SCIENCE CH... [1]
More...
Funding Project
National N... [3]
National N... [3]
National K... [2]
National N... [2]
"Strategic... [1]
Hunan Prov... [1]
More...
Indexed By
SCI [1]
Funding Organization
×
Knowledge Map
CSpace
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
QQ
Weibo
Feedback
Browse/Search Results:
1-10 of 11
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 40
Authors:
Chen Yu-Ao
;
Gao Xiao-Shan
Favorite
  |  
View/Download:82/0
  |  
Submit date:2021/04/26
Block cipher AES
Boolean equation solving
condition number
hash function SHA-3
Keccak
HHL algorithm
MPKC
polynomial system solving
quantum algorithm
stream cipher Trivum
Involutory differentially 4-uniform permutations from known constructions
期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
Authors:
Fu, Shihui
;
Feng, Xiutao
Favorite
  |  
View/Download:115/0
  |  
Submit date:2019/03/05
Involution
Differentially 4-uniform permutation
Nonlinearity
Permutation
Algebraic degree
06E30
14G50
94A60
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
Authors:
Lin, Zhuosheng
;
Yu, Simin
;
Feng, Xiutao
;
Lu, Jinhu
Favorite
  |  
View/Download:96/0
  |  
Submit date:2019/12/13
Chaotic stream cipher
divide-and-conquer attack
chosen-ciphertext attack
improved chaotic encryption algorithm
Solving polynomial systems with noise over F-2: Revisited
期刊论文
THEORETICAL COMPUTER SCIENCE, 2017, 卷号: 676, 页码: 52-68
Authors:
Huang, Zhenyu
;
Lin, Dongdai
Favorite
  |  
View/Download:84/0
  |  
Submit date:2018/07/30
Boolean polynomial system with noise
Max-PoSSo
ISBS method
Cold Boot attack
Serpent
On the cryptanalysis of Fridrich's chaotic image encryption scheme
期刊论文
SIGNAL PROCESSING, 2017, 卷号: 132, 页码: 150-154
Authors:
Xie, Eric Yong
;
Li, Chengqing
;
Yu, Simin
;
Lu, Jinhu
Favorite
  |  
View/Download:109/0
  |  
Submit date:2018/07/30
Chaotic encryption
Chosen-ciphertext attack
Cryptanalysis
Differential attack
Fault Attack on the Authenticated Cipher ACORN v2
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2017, 页码: 16
Authors:
Zhang, Xiaojuan
;
Feng, Xiutao
;
Lin, Dongdai
Favorite
  |  
View/Download:62/0
  |  
Submit date:2018/07/30
Solving Boolean equation systems and applications in cryptanalysis
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2016, 卷号: 59, 期号: 5, 页码: 2
Authors:
Gao, Xiaoshan
;
Huang, Zhenyu
Favorite
  |  
View/Download:80/0
  |  
Submit date:2018/07/30
solvingbooleanequationsystemsandapplicationsincryptanalysis
期刊论文
sciencechinainformationsciences, 2016, 卷号: 59, 期号: 5, 页码: 2
Authors:
Gao Xiaoshan
;
Huang Zhenyu
Favorite
  |  
View/Download:65/0
  |  
Submit date:2020/01/10
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme
期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 卷号: 25, 期号: 2, 页码: 619-631
Authors:
Tan, Zuo-Wen
;
Liu, Zhuo-Jun
Favorite
  |  
View/Download:54/0
  |  
Submit date:2018/07/30
proxy signature
threshold signature
forgery attack
universally forgeable
random oracle model
DL assumption
A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2008, 卷号: 21, 期号: 2, 页码: 191-208
Authors:
Chai, Fengjuan
;
Gao, Xiao-Shan
;
Yuan, Chunming
Favorite
  |  
View/Download:77/0
  |  
Submit date:2018/07/30
Boolean equation
characteristic set method
cryptanalysis
finite field
stream ciphers