期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Building Intrusion Tolerant Software System 被引量:3
1
作者 PENGWen-ling WANGLi-na +1 位作者 zhanghuan-guo CHENWei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期47-50,共4页
In this paper, we describe and analyze the hypothesis about intrusiontolerance software system, so that it can provide an intended server capability and deal with theimpacts caused by the intruder exploiting the inher... In this paper, we describe and analyze the hypothesis about intrusiontolerance software system, so that it can provide an intended server capability and deal with theimpacts caused by the intruder exploiting the inherent security vulnerabilities. Wepresent someintrusion tolerance technology by exploiting N-version module threshold method in constructingmultilevel secure software architecture, by detecting with hash value, by placing an 'antigen' wordnext to the return address on the stack thatis similar to human immune system, and by adding 'Honeycode' nonfunctional code to disturb intruder, so that the security and the availability of thesoftware system are ensured. 展开更多
关键词 intrusion tolerant immune code Honey code trusted computing
下载PDF
An FPGA Implementation of GF(p) Elliptic Curve Cryptographic Coprocessor 被引量:1
2
作者 LIUYu-zhen QINZhong-ping zhanghuan-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期31-34,共4页
A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multipli... A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multiplications. The technique of coordinates conversion and fast multiplication algorithm of two large integers are utilized to avoid frequent inversions and to accelerate the field multiplications used in point multiplications. The characteristic of hardware parallelism is considered in the implementation of point multiplications. The coprocessor implemented on XILINX XC2V3000 computes a point multiplication for an arbitrary point on a curve defined over GF(2192?264?1) with the frequency of 10 MHz in 4.40 ms in the average case and 5.74 ms in the worst case. At the same circumstance, the coprocessor implemented on XILINX XC2V4000 takes 2.2 ms in the average case and 2.88 ms in the worst case. 展开更多
关键词 elliptic curve cryptosystems cryptographic coprocessor CRYPTOGRAPHY information security
下载PDF
Model Checking Electronic CommerceSecurity Protocols Based on CTL 被引量:1
3
作者 XIAODe-qin zhanghuan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期333-337,共5页
We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, n... We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, non-repudiation) denial of serviee and access control ofthe e-lectronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover, we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user. And also, we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce. 展开更多
关键词 E-commercc security protocols formal methods computational temporal logic
下载PDF
An Improved Non-Repudiation Protocol and Its Security Analysis 被引量:1
4
作者 LiLi zhanghuan-guo WangLi-na 《Wuhan University Journal of Natural Sciences》 CAS 2004年第3期288-292,共5页
This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using t... This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol. 展开更多
关键词 non-repudiation protocol extended Kailar logic converse assumption procedure
下载PDF
Wavelet-Based Denoising Attack on Image Watermarking
5
作者 XUANJian-hui WANGLi-na zhanghuan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期279-283,共5页
In this paper, we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain ordiscrete wavelet transform (DWT) domain Wiener fil... In this paper, we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain ordiscrete wavelet transform (DWT) domain Wiener filtering based on wavelet transform is performed inapproximation subband to remove DCI or DFT domain watermark, and adaptive wavelet soft thresholdingis employed to remove the watermark resided in detail subbands of DWT domain. 展开更多
关键词 WATERMARKING watermarking attack wavelet dcnoising Wiener filter
下载PDF
Trace Representations of S-boxes and Their Application
6
作者 ZengXiang-yong FuJian-ming +1 位作者 LiuHe-guo zhanghuan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第2期173-176,共4页
In the paper, we use trace representations of Boolean functions to obtain that a class mappings including functionsF(x)=x d over field GF(2 n ), withW(d)=n?1, have desirable cryptographic properties. Therefore we gene... In the paper, we use trace representations of Boolean functions to obtain that a class mappings including functionsF(x)=x d over field GF(2 n ), withW(d)=n?1, have desirable cryptographic properties. Therefore we generalize an important result of Nyberg. As application, we use these conclusions to analyze cryptographic property of the S-box of AES (the Advanced Encryption Standard) and give its several equivalent representations, proving that the composition of inversion function of AES and any invertible affine transformations is impossible to satisfy strict avalanche criterion, any order propagation criteria and any order correlation immunity. Key words trace function - nonlinearity - differentially uniform - strict avalanche criterion CLC number TP 309 Foundation item: Supported by the National Natural Science Foundation of China (60373089, 60373041), Natural Science Foundation of Hubei Province (2002AB0037) and Chen-guang Plan of Wuhan City (20025001007).Biography: Zeng Xiang-yong (1973-), male, A postdoctoral fellow, research direction: cryptology and the representation theory of algebra. 展开更多
关键词 trace function NONLINEARITY differentially uniform strict avalanche criterion
下载PDF
Evolutionary Design of Boolean Functions
7
作者 WANGZhang-yi zhanghuan-guo +1 位作者 QINZhong-ping MENGQing-shu 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期179-182,共4页
We use evolutionaly computing to synthesize Boolean functions randomly Byusing specific crossover and mutation operator, in evolving process and modifying search space andfitness function, we get some high non-lineari... We use evolutionaly computing to synthesize Boolean functions randomly Byusing specific crossover and mutation operator, in evolving process and modifying search space andfitness function, we get some high non-linearity functions which have other good cryptographycharacteristics such as autocorrelation etc Comparing to other heuristic search techniques,evolutionary computing approach is more effective because of global search strategy and implicitparallelism. 展开更多
关键词 Boolean function non-linearity evolutionary computing
下载PDF
A Proof for the Nonexistence of Some Homogeneous Bent Functions
8
作者 MENGQing-shu zhanghuan-guo +1 位作者 QINZhong-ping WANGZhang-yi 《Wuhan University Journal of Natural Sciences》 CAS 2005年第3期504-506,共3页
By the relationship between the first linear spectra of a function at partialpoints and the Hamming weights of the sub-functions, and by the Hamming weight of homogenousBoolean function, it is proved that there exist ... By the relationship between the first linear spectra of a function at partialpoints and the Hamming weights of the sub-functions, and by the Hamming weight of homogenousBoolean function, it is proved that there exist no homogeneous bent functions ofdegree in in n = 2mvariables for m >3. 展开更多
关键词 homogeneous bent functions Walsh transformation Hamming weight
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部