期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
刍议如何通过双级差变牙花编码的方法减少锁具互开率 被引量:1
1
作者 周会林 《科技创新与应用》 2012年第08Z期3-3,共1页
以往在我国大部分的锁具生产制造行业里基本上是采用购买国外锁具自已进行测绘仿制生产的模式,但国外制锁行业与我国制锁行业相比,不论在工业基础上还是设备精确度都比国内同行业要先进许多。本文综述了在目前我国锁具制造行业,广大锁... 以往在我国大部分的锁具生产制造行业里基本上是采用购买国外锁具自已进行测绘仿制生产的模式,但国外制锁行业与我国制锁行业相比,不论在工业基础上还是设备精确度都比国内同行业要先进许多。本文综述了在目前我国锁具制造行业,广大锁具设计开发人员在锁具设计及生产时需要了解的一些锁具编码互开率的计算及如何在设计前期结合编码设计最简单有效地减少锁具互开率的方法。 展开更多
关键词 锁壳 锁芯 密匙量 级差值
下载PDF
High-performance hardware architecture of elliptic curve cryptography processor over GF(2^(163))
2
作者 Yong-ping DAN Xue-cheng ZOU +2 位作者 Zheng-lin LIU Yu HAN Li-hua YI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期301-310,共10页
We propose a novel high-performance hardware architecture of processor for elliptic curve scalar multiplication based on the Lopez-Dahab algorithm over GF(2^163) in polynomial basis representation. The processor can... We propose a novel high-performance hardware architecture of processor for elliptic curve scalar multiplication based on the Lopez-Dahab algorithm over GF(2^163) in polynomial basis representation. The processor can do all the operations using an efficient modular arithmetic logic unit, which includes an addition unit, a square and a carefully designed multiplication unit. In the proposed architecture, multiplication, addition, and square can be performed in parallel by the decomposition of computation. The point addition and point doubling iteration operations can be performed in six multiplications by optimization and solution of data dependency. The implementation results based on Xilinx VirtexⅡ XC2V6000 FPGA show that the proposed design can do random elliptic curve scalar multiplication GF(2^163) in 34.11 μs, occupying 2821 registers and 13 376 LUTs. 展开更多
关键词 Elliptic curve cryptography (ECC) Scalar multiplication Hardware implementation
原文传递
Improved multiparty quantum key agreement in travelling mode
3
作者 Wei Huang Qi Su +4 位作者 BingJie Xu Bin Liu Fan Fan HengYue Jia YingHui Yang 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第12期12-21,共10页
The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designi... The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designing an MQKA protocol,two modes can be used to transmit the quantum information carriers: travelling mode and distributed mode. MQKA protocols usually have a higher qubit efficiency in travelling mode than in distributed mode. Thus, several travelling mode MQKA protocols have been proposed. However, almost all of these are vulnerable to collusion attacks from internal betrayers. This paper proposes an improved MQKA protocol that operates in travelling mode with Einstein-Podolsky-Rosen pairs. More importantly, we present a new travelling mode MQKA protocol that uses single photons, which is more feasible than previous methods under current technologies. 展开更多
关键词 quantum cryptography multiparty quantum key agreement travelling mode cryptanalysis and improvement
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部