期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
吴新华治疗子宫内膜息肉经验
1
作者 鞠红梅 崔新红 《中医学报》 CAS 2024年第5期1020-1023,共4页
子宫内膜息肉发生的根本原因是瘀血阻滞胞宫。肾阳不足,血失温煦,阳虚生寒,鼓动无力,引起气机运行不畅,血行受阻,瘀血阻滞胞宫,冲任调节失司,血行不畅,故而发病。临证治以温肾活血逐瘀法,舒畅冲任,行气逐瘀,消散癥瘕、积聚,并以王清任... 子宫内膜息肉发生的根本原因是瘀血阻滞胞宫。肾阳不足,血失温煦,阳虚生寒,鼓动无力,引起气机运行不畅,血行受阻,瘀血阻滞胞宫,冲任调节失司,血行不畅,故而发病。临证治以温肾活血逐瘀法,舒畅冲任,行气逐瘀,消散癥瘕、积聚,并以王清任少腹逐瘀汤辨证加减,自拟“消息方”,配合三阴交穴位按摩,临床效果满意。 展开更多
关键词 子宫内膜息肉 少腹逐瘀汤 “消息方” 三阴交穴 穴位按摩 温肾活血逐瘀法 吴新华
下载PDF
Collision-Based Chosen-Message Simple Power Clustering Attack Algorithm 被引量:1
2
作者 陈艾东 许森 +1 位作者 陈运 秦志光 《China Communications》 SCIE CSCD 2013年第5期114-119,共6页
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif... Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%. 展开更多
关键词 crypt analysis side channel attack collision attack chosen-message attack clustering algorithm
下载PDF
Provably Secure Self-Certified Signature Schemes with Message Recovery
3
作者 Zhang Shengyuan Tang Fei Lin Changlu Ke Pinhui 《China Communications》 SCIE CSCD 2012年第10期112-119,共8页
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key... To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes . 展开更多
关键词 digital signature self-certified public key message recovery random oracle model
下载PDF
Self-certified multi-proxy signature schemes with message recovery 被引量:2
4
作者 Tzong-sun WU Chien-lung HSU Han-yu LIN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期290-300,共11页
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original sign... Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes,our proposed schemes have the following advan-tages:(1) They do not require the signing message to be transmitted,since the verifier can recover it from the signature;(2) The authentication of the public keys,verification of the signature,and recovery of the message can be simultaneously carried out in a single logical step;(3) No certificate is needed for validating the public keys. Further,the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space,e.g.,smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems,the proposed schemes give better performance in terms of communication bandwidth and computation efforts. 展开更多
关键词 Self-certified Multi-proxy signature Message recovery Smart cards Discrete logarithms Elliptic curve
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部