CSpace

浏览/检索结果: 共14条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project 期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:  Liu, Zhen;  Pan, Yanbin;  Xie, Tianyuan
收藏  |  浏览/下载:150/0  |  提交时间:2020/10/12
decoding  public key cryptography  quantum cryptography  computational complexity  optimisation  cyclic codes  IND-CPA security  NIST PQC project  hamming quasicyclic cryptosystem  code-based key encapsulation mechanism  NIST standardisation process  public-key encryption scheme  IND-CCA2 secure KEM  revised scheme HQC- beta  HQC cryptosystem  s-DQCSD problem  s-decision quasi-cyclic syndrome decoding  plaintext attack  
A recursive construction of permutation polynomials over F-q2 with odd characteristic related to Redei functions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 7, 页码: 1481-1498
作者:  Fu, Shihui;  Feng, Xiutao;  Lin, Dongdai;  Wang, Qiang
收藏  |  浏览/下载:142/0  |  提交时间:2020/01/10
Finite fields  Permutation polynomials  Compositional inverse  Redei functions  Dickson polynomials  
Involutory differentially 4-uniform permutations from known constructions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
作者:  Fu, Shihui;  Feng, Xiutao
收藏  |  浏览/下载:148/0  |  提交时间:2019/03/05
Involution  Differentially 4-uniform permutation  Nonlinearity  Permutation  Algebraic degree  06E30  14G50  94A60  
Information Security Protocol Based System Identification with Binary-Valued Observations 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
作者:  Xu, Changbao;  Zhao, Yanlong;  Zhang, Ji-Feng
收藏  |  浏览/下载:142/0  |  提交时间:2018/07/30
Cryptography  identification algorithm  information security  passive attacks  security protocol  time complexity  
Three new infinite families of bent functions 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 3, 页码: 14
作者:  Wang, Libo;  Wu, Baofeng;  Liu, Zhuojun;  Lin, Dongdai
收藏  |  浏览/下载:146/0  |  提交时间:2018/07/30
bent function  Hadamard matrix  Kasami function  Gold-like function  Niho exponent  
informationsecurityprotocolbasedsystemidentificationwithbinaryvaluedobservations 期刊论文
journalofsystemsscienceandcomplexity, 2018, 卷号: 031, 期号: 004, 页码: 946
作者:  Xu Changbao;  Zhao Yanlong;  Zhang Jifeng
收藏  |  浏览/下载:158/0  |  提交时间:2020/01/10
Encryption algorithm based on Hadoop and non-degenerate high-dimensional discrete hyperchaotic system 期刊论文
ACTA PHYSICA SINICA, 2017, 卷号: 66, 期号: 23, 页码: 14
作者:  Wen He-Ping;  Yu Si-Min;  Lu Jin-Hu
收藏  |  浏览/下载:169/0  |  提交时间:2018/07/30
chaotic system  chaotic cipher  Hadoop  
Nonexistence of two classes of generalized bent functions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2017, 卷号: 85, 期号: 3, 页码: 471-482
作者:  Li, Jianing;  Deng, Yingpu
收藏  |  浏览/下载:120/0  |  提交时间:2018/07/30
Generalized bent functions  Cyclotomic fields  Prime ideal factorizations  Class groups  
On the cryptanalysis of Fridrich's chaotic image encryption scheme 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 132, 页码: 150-154
作者:  Xie, Eric Yong;  Li, Chengqing;  Yu, Simin;  Lu, Jinhu
收藏  |  浏览/下载:140/0  |  提交时间:2018/07/30
Chaotic encryption  Chosen-ciphertext attack  Cryptanalysis  Differential attack  
An improvement over the GVW algorithm for inhomogeneous polynomial systems 期刊论文
FINITE FIELDS AND THEIR APPLICATIONS, 2016, 卷号: 41, 页码: 174-192
作者:  Sun, Yao;  Huang, Zhenyu;  Wang, Dingkang;  Lin, Dongdai
收藏  |  浏览/下载:110/0  |  提交时间:2018/07/30
Grobner basis  The GVW algorithm  Signature-based algorithm  Linear algebra  Boolean polynomial ring