CSpace

浏览/检索结果: 共11条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 40
作者:  Chen Yu-Ao;  Gao Xiao-Shan
收藏  |  浏览/下载:121/0  |  提交时间:2021/04/26
Block cipher AES  Boolean equation solving  condition number  hash function SHA-3  Keccak  HHL algorithm  MPKC  polynomial system solving  quantum algorithm  stream cipher Trivum  
Involutory differentially 4-uniform permutations from known constructions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
作者:  Fu, Shihui;  Feng, Xiutao
收藏  |  浏览/下载:148/0  |  提交时间:2019/03/05
Involution  Differentially 4-uniform permutation  Nonlinearity  Permutation  Algebraic degree  06E30  14G50  94A60  
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme 期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:  Lin, Zhuosheng;  Yu, Simin;  Feng, Xiutao;  Lu, Jinhu
收藏  |  浏览/下载:124/0  |  提交时间:2019/12/13
Chaotic stream cipher  divide-and-conquer attack  chosen-ciphertext attack  improved chaotic encryption algorithm  
Solving polynomial systems with noise over F-2: Revisited 期刊论文
THEORETICAL COMPUTER SCIENCE, 2017, 卷号: 676, 页码: 52-68
作者:  Huang, Zhenyu;  Lin, Dongdai
收藏  |  浏览/下载:115/0  |  提交时间:2018/07/30
Boolean polynomial system with noise  Max-PoSSo  ISBS method  Cold Boot attack  Serpent  
On the cryptanalysis of Fridrich's chaotic image encryption scheme 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 132, 页码: 150-154
作者:  Xie, Eric Yong;  Li, Chengqing;  Yu, Simin;  Lu, Jinhu
收藏  |  浏览/下载:140/0  |  提交时间:2018/07/30
Chaotic encryption  Chosen-ciphertext attack  Cryptanalysis  Differential attack  
Fault Attack on the Authenticated Cipher ACORN v2 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2017, 页码: 16
作者:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
收藏  |  浏览/下载:92/0  |  提交时间:2018/07/30
Solving Boolean equation systems and applications in cryptanalysis 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2016, 卷号: 59, 期号: 5, 页码: 2
作者:  Gao, Xiaoshan;  Huang, Zhenyu
收藏  |  浏览/下载:108/0  |  提交时间:2018/07/30
solvingbooleanequationsystemsandapplicationsincryptanalysis 期刊论文
sciencechinainformationsciences, 2016, 卷号: 59, 期号: 5, 页码: 2
作者:  Gao Xiaoshan;  Huang Zhenyu
收藏  |  浏览/下载:99/0  |  提交时间:2020/01/10
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme 期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 卷号: 25, 期号: 2, 页码: 619-631
作者:  Tan, Zuo-Wen;  Liu, Zhuo-Jun
收藏  |  浏览/下载:78/0  |  提交时间:2018/07/30
proxy signature  threshold signature  forgery attack  universally forgeable  random oracle model  DL assumption  
A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2008, 卷号: 21, 期号: 2, 页码: 191-208
作者:  Chai, Fengjuan;  Gao, Xiao-Shan;  Yuan, Chunming
收藏  |  浏览/下载:106/0  |  提交时间:2018/07/30
Boolean equation  characteristic set method  cryptanalysis  finite field  stream ciphers