期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
VFP数据库一种新型密码加密方法
1
作者 杨凤霞 《电脑学习》 2005年第2期62-63,共2页
介绍了VFP数据库一种新型加密方法,并给出了源程序代码。
关键词 VFP数据库 密码加密方法 源程序代码 函数
下载PDF
Differential Collision Attack on Reduced FOX Block Cipher 被引量:5
2
作者 Chen Jie Hu Yupu +1 位作者 Zhang Yueyu Dong Xiaoli 《China Communications》 SCIE CSCD 2012年第7期71-76,共6页
This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has... This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round. 展开更多
关键词 CRYPTOGRAPHY block cipher FOX differential collision attack
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
3
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
Multi-Level Cryptographic Functions for the Functionalities of Open Database System
4
作者 Akinwale Taofiki Adio Adekoya Felix Adebayo Ooju Emmanuel Oluwafemi 《Computer Technology and Application》 2011年第9期730-735,共6页
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio... The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information. 展开更多
关键词 Database system CRYPTOGRAPHY agent random number PEER-TO-PEER algorithm
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部