期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
神奇数学密码
1
作者 星河 《少年科普世界(快乐数学4-6年级版)》 2011年第12期11-13,共3页
小国王没有想到的是,张晓数已经开始画图了。“还真有点费劲啊。”张晓数边说边在纸上开始画起来。“你可得快点啊。”袁园圆在张晓数耳边说道,“小国王可有点着急了。”
关键词 数学密码 阅读 文学 故事
原文传递
神奇数学密码
2
作者 星河 《少年科普世界(快乐数学4-6年级版)》 2011年第6期8-11,共4页
“不过——”小国主眼珠转了一下,“就算你们千方百计地让我相信数学有用,告诉我生活中充满了数学,还是说服不了我。”
关键词 小学 数学教学 教学方法 数学密码
原文传递
一种可用于光学密码的安全增强工作模式
3
作者 袁科 贾春福 +2 位作者 吕述望 黄贻望 高社成 《电子与信息学报》 EI CSCD 北大核心 2013年第3期735-741,共7页
为满足云计算对高安全、高效率密码方案的需求,该文提出一种安全增强密码工作模式——密码反馈"一组一密"(Cipher FeedBack one Block one Key,CFB-BK)模式,并基于数学密码和光学密码组合实现:光学密码对数据分组进行"... 为满足云计算对高安全、高效率密码方案的需求,该文提出一种安全增强密码工作模式——密码反馈"一组一密"(Cipher FeedBack one Block one Key,CFB-BK)模式,并基于数学密码和光学密码组合实现:光学密码对数据分组进行"一组一密"加解密,数学密码利用光学密码密文生成供光学密码下一组数据加解密使用的密钥。安全性分析表明,攻击者在密码学技术范围内,只能采用穷举密钥攻击方式,攻击复杂度高;效率分析表明,比基于数学密码实现的模式效率更高。 展开更多
关键词 云计算 光学密码 数学密码 密码反馈一组一密模式 一组一密
下载PDF
密码通信的现状与发展趋势
4
作者 续京沙 《无线电通信参考》 1989年第1期41-51,共11页
关键词 密码通信 密码数学 密码体制
下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
5
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
下载PDF
关于组合算法的一些问题
6
作者 苏运霖 《广西科学院学报》 2007年第4期220-222,共3页
介绍几种加性和乘性字母算术(或密码数学)问题及生成结果为100的表达式的组合问题的一些成果,并提出3个问题:如何代入数字使工业化+农业化+科学化=现代数化,立党为公+执政为民=为人民服务,更快×更高×更强=奥林匹克精神成立。
关键词 组合数学 组合算法 字母算术 密码数学
下载PDF
CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE 被引量:13
7
作者 Zhang Lei Zhang Futai 《Journal of Electronics(China)》 2008年第5期629-635,共7页
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-... Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem. 展开更多
关键词 Certificateless cryptography Digital signature Blind signature Certificateless blind signature Computational Diffie-Hellman (CDH) problem
下载PDF
Improvement of Laih and Yen's multisignature scheme 被引量:2
8
作者 谢琪 于秀源 《Journal of Zhejiang University Science》 EI CSCD 2004年第9期1155-1159,共5页
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment b... A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme. 展开更多
关键词 Digital signature MULTISIGNATURE CRYPTOGRAPHY
下载PDF
Find Better Boolean Functions in the Affine Equivalence Class 被引量:2
9
作者 CHEN Wei-hong LI Na 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2005年第4期395-400,共6页
The Boolean functions in an affine equivalence class are of the same algebraicdegree and nonlinearity, but may satisfy different order of correlation immunity and propa-gation criterion. A method is presented in this ... The Boolean functions in an affine equivalence class are of the same algebraicdegree and nonlinearity, but may satisfy different order of correlation immunity and propa-gation criterion. A method is presented in this paper to find Boolean functions with higherorder correlation immunity or satisfying higher order propagation criterion in an affine equiv-alence class. 8 AES s-box functions are not better Boolean functions in their affine equiva-lence class. 展开更多
关键词 Boolean function Walsh spectra BALANCE NONLINEARITY correlation immunity propagation criterion AES S-BOX
下载PDF
ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD 被引量:1
10
作者 SuiAifen LucasC.K.Hui +1 位作者 YangYixian K.P.Chow 《Journal of Electronics(China)》 2005年第3期268-272,共5页
Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Probl... Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It provides identity authentication, key validation and perfect forward secrecy, and it can foil man-in-the-middle attacks. 展开更多
关键词 Elliptic Curve Cryptography (ECC) DIFFIE-HELLMAN Simple Authenticated Key Agreement (SAKA)
下载PDF
Cryptanalysis and Improvement of Signcryption Schemes on Elliptic Curves 被引量:2
11
作者 LIXiang-xue CHENKe-fei LIShi-qun 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期231-234,共4页
In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose... In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non-repudiation. We also propose two improvement versions that not only overcome the security leak inherent in the schemes but also provide public verifiability or forward security. Our improvement versions require smaller computing cost than that required by signature-then-encryption methods. 展开更多
关键词 SIGNCRYPTION elliptic curve CRYPTANALYSIS
下载PDF
A SECURE THRESHOLD GROUP SIGNATURE SCHEME
12
作者 WangXiaoming FuFangwei 《Journal of Electronics(China)》 2003年第4期274-278,共5页
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a sec... The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack. 展开更多
关键词 CRYPTOGRAPHY Digital signature Threshold signature Conspiracy attack
下载PDF
New Multisignature Scheme Based on Bilinear Pairings
13
作者 LI Bin LI ji-guo +1 位作者 ZHAO Ze-mao WU Yi 《Semiconductor Photonics and Technology》 CAS 2006年第2期131-135,共5页
Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same secu... Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same security as JI and LIs multisignature scheme, but the new scheme has the lower computation. So the new scheme is the multisignature which has high security and low computation. It has the theory meaning and extensive application under the condition of SmartCard, etc. 展开更多
关键词 CRYPTOGRAPHY Digital signature Digital multisignature Bilinear pairings
下载PDF
Key Exchange Protocol Based on Tensor Decomposition Problem 被引量:1
14
作者 MAO Shaowu ZHANG Huanguo +3 位作者 WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 《China Communications》 SCIE CSCD 2016年第3期174-183,共10页
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing.... The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols. 展开更多
关键词 key exchange resistant quantum hard problem tensor decomposition
下载PDF
量子密码技术及其军事应用 被引量:3
15
作者 朱岳超 田永泰 《信息安全与通信保密》 2004年第5期49-50,共2页
关键词 量子密码技术 军事应用 密码 信息保护 数学密码技术 互联网传输
原文传递
邮政储蓄指纹验证系统
16
作者 包列 戴菁 《中国邮政》 2001年第6期26-26,共1页
关键词 邮政储蓄 指纹验证 SCO UNIX服务器 用户身份 犯罪 数学密码
原文传递
A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties 被引量:1
17
作者 SHAN Jinyong HU Lei +1 位作者 ZENG Xiangyong LI Chunlei 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第4期1042-1064,共23页
This paper proposes a general method to construct 1-resilient Boolean functions by modifying the Tu-Deng and Tang-Carlet-Tang functions. Cryptographic properties such as algebraic degree, nonlinearity and algebraic im... This paper proposes a general method to construct 1-resilient Boolean functions by modifying the Tu-Deng and Tang-Carlet-Tang functions. Cryptographic properties such as algebraic degree, nonlinearity and algebraic immunity are also considered. A sufficient condition of the modified func- tions with optimal algebraic degree in terms of the Siegenthaler bound is proposed. The authors obtain a lower bound on the nonlinearity of the Tang-Carlet-Tang functions, which is slightly better than the known result. If the authors do not break the "continuity" of the support and zero sets, the functions constructed in this paper have suboptimal algebraic immunity. Finally, four specific classes of 1-resilient Boolean functions constructed from this construction and with the mentioned good cryptographic properties are proposed. Experimental results show that there are many 1-resilient Boolean functions have higher nonlinearities than known l-resilient functions modified by Tu-Deng and Tang- Carlet-Tang functions. 展开更多
关键词 Algebraic immunity Boolean functions correlation immunity NONLINEARITY resilient
原文传递
THE SYMMETRY GROUPS OF NONLINEARITY CRITERIA 被引量:1
18
作者 LIDan QIUWeisheng 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2004年第1期28-32,共5页
It is already known that there are several nonlinearity criteria such asalgebraic degree nonlinearity, distance to linear structures, correlation immune, propagationcriterion, differential uniformity, which are used t... It is already known that there are several nonlinearity criteria such asalgebraic degree nonlinearity, distance to linear structures, correlation immune, propagationcriterion, differential uniformity, which are used to check whether a cryptographic function is weakor not. In this paper we will discuss these criteria from a valuation point of view, and considerthe largest transformation group which leave a criterion invariant, which is named its symmetrygroup. It can serve as a way of comparing the stability of nonlinearity criteria under the action ofinvertible transformations. 展开更多
关键词 cryptographic functions nonlinearity criteria symmetry group of a valuation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部