CSpace

Browse/Search Results:  1-10 of 31 Help

Selected(0)Clear Items/Page:    Sort:
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project 期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
Authors:  Liu, Zhen;  Pan, Yanbin;  Xie, Tianyuan
Favorite  |  View/Download:4/0  |  Submit date:2020/10/12
decoding  public key cryptography  quantum cryptography  computational complexity  optimisation  cyclic codes  IND-CPA security  NIST PQC project  hamming quasicyclic cryptosystem  code-based key encapsulation mechanism  NIST standardisation process  public-key encryption scheme  IND-CCA2 secure KEM  revised scheme HQC- beta  HQC cryptosystem  s-DQCSD problem  s-decision quasi-cyclic syndrome decoding  plaintext attack  
The Adjacency Graphs of a Class of LFSRs and Their Applications* 期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2019, 卷号: 28, 期号: 6, 页码: 1210-1216
Authors:  Wang, Hui;  Feng, Xiutao
Favorite  |  View/Download:6/0  |  Submit date:2020/05/24
binary sequences  feedback  graph theory  polynomials  shift registers  maximal periods  de Bruijn sequences  adjacency graphs  Linear feedback shift registers  LFSRs  cycle joining method  nonlinear feedback shift registers  NFSRs  characteristic polynomial  primitive polynomial  Nonlinear feedback shift register (NFSR)  de Bruijn sequence  Cycle structure  Adjacency graph  
CM values of Green functions associated to special cycles on Shimura varieties with applications to Siegel 3-fold X-2(2) 期刊论文
JOURNAL OF NUMBER THEORY, 2019, 卷号: 203, 页码: 155-210
Authors:  Yu, Peng
Favorite  |  View/Download:18/0  |  Submit date:2020/01/10
Shimura varieties  Complex multiplication  Siegel-Weil formula  
A recursive construction of permutation polynomials over F-q2 with odd characteristic related to Redei functions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 7, 页码: 1481-1498
Authors:  Fu, Shihui;  Feng, Xiutao;  Lin, Dongdai;  Wang, Qiang
Favorite  |  View/Download:13/0  |  Submit date:2020/01/10
Finite fields  Permutation polynomials  Compositional inverse  Redei functions  Dickson polynomials  
Involutory differentially 4-uniform permutations from known constructions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
Authors:  Fu, Shihui;  Feng, Xiutao
Favorite  |  View/Download:13/0  |  Submit date:2019/03/05
Involution  Differentially 4-uniform permutation  Nonlinearity  Permutation  Algebraic degree  06E30  14G50  94A60  
theadjacencygraphsofaclassoflfsrsandtheirapplications 期刊论文
chinesejournalofelectronics, 2019, 卷号: 28, 期号: 6, 页码: 1210-1216
Authors:  Wang Hui;  Feng Xiutao
Favorite  |  View/Download:9/0  |  Submit date:2020/05/24
Information Security Protocol Based System Identification with Binary-Valued Observations 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
Authors:  Xu, Changbao;  Zhao, Yanlong;  Zhang, Ji-Feng
Favorite  |  View/Download:18/0  |  Submit date:2018/07/30
Cryptography  identification algorithm  information security  passive attacks  security protocol  time complexity  
Three new infinite families of bent functions 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 3, 页码: 14
Authors:  Wang, Libo;  Wu, Baofeng;  Liu, Zhuojun;  Lin, Dongdai
Favorite  |  View/Download:12/0  |  Submit date:2018/07/30
bent function  Hadamard matrix  Kasami function  Gold-like function  Niho exponent  
informationsecurityprotocolbasedsystemidentificationwithbinaryvaluedobservations 期刊论文
journalofsystemsscienceandcomplexity, 2018, 卷号: 031, 期号: 004, 页码: 946
Authors:  Xu Changbao;  Zhao Yanlong;  Zhang Jifeng
Favorite  |  View/Download:14/0  |  Submit date:2020/01/10
Three new infinite families of bent functions 期刊论文
Science China. Information Science, 2018, 卷号: 61, 期号: 3, 页码: 14
Authors:  Wang Libo;  Wu Baofeng;  Liu Zhuojun;  Lin Dongdai
Favorite  |  View/Download:10/0  |  Submit date:2019/12/31