期刊文献+
共找到1,501篇文章
< 1 2 76 >
每页显示 20 50 100
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
1
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
下载PDF
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
2
作者 Mugaruka Buduge Gulain Jeremie Ndikumagenge +2 位作者 Buhendwa Nyenyezi Justin Bulonza Masumbuko Alexis Katho Seba Jacques 《Journal of Information Security》 2024年第3期299-307,共9页
In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any mod... In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A companys operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article. 展开更多
关键词 Comparative Study cryptosystemS Symmetric Encryption Asymmetric Encryption
下载PDF
A Speech Cryptosystem Using the New Chaotic System with a Capsule-Shaped Equilibrium Curve
3
作者 Mohamad Afendee Mohamed Talal Bonny +6 位作者 Aceng Sambas Sundarapandian Vaidyanathan Wafaa Al Nassan Sen Zhang Khaled Obaideen Mustafa Mamat Mohd Kamal Mohd Nawawi 《Computers, Materials & Continua》 SCIE EI 2023年第6期5987-6006,共20页
In recent years,there are numerous studies on chaotic systems with special equilibrium curves having various shapes such as circle,butterfly,heart and apple.This paper describes a new 3-D chaotic dynamical system with... In recent years,there are numerous studies on chaotic systems with special equilibrium curves having various shapes such as circle,butterfly,heart and apple.This paper describes a new 3-D chaotic dynamical system with a capsule-shaped equilibrium curve.The proposed chaotic system has two quadratic,two cubic and two quartic nonlinear terms.It is noted that the proposed chaotic system has a hidden attractor since it has an infinite number of equilibrium points.It is also established that the proposed chaotic system exhibits multi-stability with two coexisting chaotic attractors for the same parameter values but differential initial states.A detailed bifurcation analysis with respect to variations in the system parameters is portrayed for the new chaotic system with capsule equilibrium curve.We have shown MATLAB plots to illustrate the capsule equilibrium curve,phase orbits of the new chaotic system,bifurcation diagrams and multi-stability.As an engineering application,we have proposed a speech cryptosystem with a numerical algorithm,which is based on our novel 3-D chaotic system with a capsule-shaped equilibrium curve.The proposed speech cryptosystem follows its security evolution and implementation on Field Programmable Gate Array(FPGA)platform.Experimental results show that the proposed encryption system utilizes 33%of the FPGA,while the maximum clock frequency is 178.28 MHz. 展开更多
关键词 Chaos chaotic systems hidden attractors multi-stability BIFURCATION speech cryptosystem FPGA design
下载PDF
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map
4
作者 Sultan Almakdi Mohammed SAlshehri +3 位作者 Yousef Asiri Mimonah Al Qathrady Anas Ibrar Jawad Ahmad 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3017-3036,共20页
Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare appl... Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare applications.In this study,a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things(IoMT)and cloud storage.A disorganized three-dimensional map is the foundation of the proposed cipher.The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process.The suggested cryptosystem enhances the security of the delivered medical images by performing many operations.To validate the efficiency of the recommended cryptosystem,various medical image kinds are used,each with its unique characteristics.Several measures are used to evaluate the proposed cryptosystem,which all support its robust security.The simulation results confirm the supplied cryptosystem’s secrecy.Furthermore,it provides strong robustness and suggested protection standards for cloud service applications,healthcare,and IoMT.It is seen that the proposed 3D chaotic cryptosystem obtains an average entropy of 7.9998,which is near its most excellent value of 8,and a typical NPCR value of 99.62%,which is also near its extreme value of 99.60%.Moreover,the recommended cryptosystem outperforms conventional security systems across the test assessment criteria. 展开更多
关键词 Jigsaw transformation cryptosystem image encryption medical images Ikeda map chaotic system
下载PDF
Learning with Errors Public Key Cryptosystem with Its Security
5
作者 Zhiyong Zheng Kun Tian +1 位作者 Yi Zhang Yunfan Lu 《Journal of Information Security》 2023年第1期25-38,共14页
The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous res... The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous research results. Then we prove the security of LWE public key cryptosystem by Regev in detail. For not only independent identical Gaussian disturbances but also any general independent identical disturbances, we give a more accurate estimation probability of decryption error of general LWE cryptosystem. This guarantees high security and widespread applications of the LWE public key cryptosystem. 展开更多
关键词 Learning With Errors Problem cryptosystem Decryption Error PROBABILITY SECURITY
下载PDF
轻量级密码Pyjamask和SUNDAE-GIFT的不可能统计故障分析
6
作者 李玮 高建宁 +2 位作者 谷大武 秦梦洋 刘源 《计算机学报》 EI CAS CSCD 北大核心 2024年第5期1010-1029,共20页
Pyjamask密码是2020年由Goudarzi等学者在国际对称密码学期刊中提出的密码算法,同时也是国际轻量级密码竞赛第二轮候选算法,旨在保护物联网中传感器、智能芯片和嵌入式设备的数据安全.本文结合Pyjamask密码的设计结构和实现特点,基于不... Pyjamask密码是2020年由Goudarzi等学者在国际对称密码学期刊中提出的密码算法,同时也是国际轻量级密码竞赛第二轮候选算法,旨在保护物联网中传感器、智能芯片和嵌入式设备的数据安全.本文结合Pyjamask密码的设计结构和实现特点,基于不可能关系策略和统计分析,提出适用于在唯密文环境下的不可能统计故障分析方法,并设计了 Wasserstein距离-汉明重量和Wasserstein距离-极大似然估计区分器.该分析方法分别仅需1024和1120个随机故障密文,即可在59.84ms和140.16ms内破译Pyjamask密码全部版本的128比特主密钥.并且,该方法和区分器均可用于认证加密算法SUNDAE-GIFT的分析中.不可能统计故障分析的攻击速度快,并且实现代价低,为轻量级密码的实现安全研究提供了有价值的参考. 展开更多
关键词 轻量级密码 Pyjamask SUNDAE-GIFT 故障分析 不可能关系 密码分析
下载PDF
PRIDE轻量级密码的不可能统计故障分析
7
作者 李玮 孙文倩 +2 位作者 谷大武 张爱琳 温云华 《通信学报》 EI CSCD 北大核心 2024年第1期141-151,共11页
针对2014年美密会上提出的PRIDE轻量级密码的实现安全,提出了面向唯密文攻击假设的新型不可能统计故障分析方法,设计了卡方拟合优度-汉明重量区分器、卡方拟合优度-极大似然估计区分器等新型区分器。所提方法基于随机半字节故障模型,结... 针对2014年美密会上提出的PRIDE轻量级密码的实现安全,提出了面向唯密文攻击假设的新型不可能统计故障分析方法,设计了卡方拟合优度-汉明重量区分器、卡方拟合优度-极大似然估计区分器等新型区分器。所提方法基于随机半字节故障模型,结合统计分布状态和不可能关系分析,围绕导入故障前后中间状态的变化,最少仅需432个故障即可恢复出PRIDE算法的128 bit原始密钥,且成功率达99%及以上。实验分析表明,所提方法不仅能减少故障数和耗时,而且进一步提升了准确率。该结果对轻量级密码的实现安全性提供了重要参考。 展开更多
关键词 侧信道分析 不可能统计故障分析 轻量级密码 PRIDE 智能无人系统
下载PDF
对称密码体制的量子攻击
8
作者 冯晓宁 吴洪宇 《应用科学学报》 CAS CSCD 北大核心 2024年第1期39-52,共14页
该文梳理了近年来量子攻击在对称密码体制的研究脉络,分析了主流攻击方法的研究趋势与各文献之间的关系,并将主流攻击方法分为量子周期攻击、Grover算法相关攻击、量子差分攻击3类,分别介绍了具有代表性的攻击方法,呈现了各攻击方法的... 该文梳理了近年来量子攻击在对称密码体制的研究脉络,分析了主流攻击方法的研究趋势与各文献之间的关系,并将主流攻击方法分为量子周期攻击、Grover算法相关攻击、量子差分攻击3类,分别介绍了具有代表性的攻击方法,呈现了各攻击方法的核心思想。立足于现有的攻击方案,展望了这一领域可能会出现的热门研究方向。 展开更多
关键词 密码分析 量子算法 对称密码体制 量子攻击
下载PDF
非比例阻尼线性体系地震响应的部分平方组合(CPQC)法 被引量:4
9
作者 俞瑞芳 周锡元 《土木工程学报》 EI CSCD 北大核心 2006年第11期43-49,126,共8页
对于非比例阻尼线性系统,当采用基于复振型的地震反应谱振型叠加方法,即复振型完全平方组合(CCQC)方法进行动力反应分析时计算工作量较大。为此,通过分析不同振型之间的位移、速度、位移-速度相关系数随频率比和阻尼比的变化规律,给出... 对于非比例阻尼线性系统,当采用基于复振型的地震反应谱振型叠加方法,即复振型完全平方组合(CCQC)方法进行动力反应分析时计算工作量较大。为此,通过分析不同振型之间的位移、速度、位移-速度相关系数随频率比和阻尼比的变化规律,给出了复振型平方和开方(CSRSS)组合方法的适用范围。同时通过分析指出在CCQC法中只需要考虑邻近振型的相关性,因此建议了一种介于CCQC法和CSRSS法之间的考虑部分相关性的复振型平方组合方法,称之为简化的CCQC法或复振型部分平方组合(CPQC)方法,用以提高计算效率。通过实例分析验证了所建议方法的适用范围、计算精度和效率。由于比例阻尼系统的地震反应谱振型组合方法是文中所述一般方法的特殊情况,因此本文提出的简化分析方法对比例阻尼系统也同样是适用的,并可以称为部分平方组合(PQC)方法。 展开更多
关键词 振型组合 非比例阻尼 复完全平方组合法 复振型部分平方组合方法 部分平方组合方法
下载PDF
车载网中高效安全的无证书聚合签名方案
10
作者 顾妍妍 沈丽敏 +1 位作者 高晨旭 朱婷 《信息网络安全》 CSCD 北大核心 2024年第2期188-202,共15页
为了保障车载网系统中车辆间通信的完整性、真实性、有效性和即时性,文章提出了一种能抗合谋攻击且不需要双线性对的无证书聚合签名方案。无证书密码体制既较好地解决了基于身份的密码体制所固有的密钥托管问题,又保留了基于身份的密码... 为了保障车载网系统中车辆间通信的完整性、真实性、有效性和即时性,文章提出了一种能抗合谋攻击且不需要双线性对的无证书聚合签名方案。无证书密码体制既较好地解决了基于身份的密码体制所固有的密钥托管问题,又保留了基于身份的密码体制不需要使用公钥证书的优点。文章基于椭圆曲线离散对数问题和分叉引理,在随机预言模型中严格证明了其安全性。性能及效率分析表明,该方案是有效的,在保证通讯数据完整性和真实性的同时,减少了带宽开销以及存储开销,提高了验证效率。 展开更多
关键词 聚合签名 合谋攻击 无证书密码体制 车载网
下载PDF
基于AVX512的格密码高速并行实现
11
作者 雷斗威 何德彪 +1 位作者 罗敏 彭聪 《计算机工程》 CAS CSCD 北大核心 2024年第2期15-24,共10页
量子计算的迅速发展可能对当前广泛使用的公钥密码算法造成严重威胁。格密码因优秀的抗量子安全性和高效的计算效率在后量子密码中占据重要地位。美国国家标准技术研究院于2022年5月公布4个后量子密码标准,其中3个是格密码算法,Kyber算... 量子计算的迅速发展可能对当前广泛使用的公钥密码算法造成严重威胁。格密码因优秀的抗量子安全性和高效的计算效率在后量子密码中占据重要地位。美国国家标准技术研究院于2022年5月公布4个后量子密码标准,其中3个是格密码算法,Kyber算法便是其中之一。随着后量子密码标准的确定,Kyber算法高效实现的需求日益增加。基于512位高级向量扩展(AVX512),对Kyber算法进行优化与高速并行实现。使用惰性模约减、优化的蒙哥马利模约减及优化的快速数论变化等技术,充分利用计算机的存储空间,减少大量不必要的模约减操作,提高多项式计算的效率与并行性。采用冗余比特技术,增强多项式抽样过程中比特的并行处理能力。通过AVX512的512 bit位宽和8路并行实现哈希运算,并对其产生的伪随机比特串进行合理调度,充分发挥并行性能。基于AVX512指令集高速并行实现Kyber上的多项式计算和抽样,并进一步实现整个Kyber公钥加密方案。性能测试结果表明,与C语言实现相比,基于AVX512实现的密钥生成和加密算法获得了10~16倍的加速,解密算法获得了约56倍的加速。 展开更多
关键词 后量子密码 格密码 公钥加密 512位高级向量扩展指令集 并行计算
下载PDF
Love wave propagation in one-dimensional piezoelectric quasicrystal multilayered nanoplates with surface effects
12
作者 Xin FENG Liaoliang KE Yang GAO 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2024年第4期619-632,共14页
The exact solutions for the propagation of Love waves in one-dimensional(1D)hexagonal piezoelectric quasicrystal(PQC)nanoplates with surface effects are derived.An electro-elastic model is developed to investigate the... The exact solutions for the propagation of Love waves in one-dimensional(1D)hexagonal piezoelectric quasicrystal(PQC)nanoplates with surface effects are derived.An electro-elastic model is developed to investigate the anti-plane strain problem of Love wave propagation.By introducing three shape functions,the wave equations and electric balance equations are decoupled into three uncorrelated problems.Satisfying the boundary conditions of the top surface on the covering layer,the interlayer interface,and the matrix,a dispersive equation with the influence of multi-physical field coupling is provided.A surface PQC model is developed to investigate the surface effects on the propagation behaviors of Love waves in quasicrystal(QC)multilayered structures with nanoscale thicknesses.A novel dispersion relation for the PQC structure is derived in an explicit closed form according to the non-classical mechanical and electric boundary conditions.Numerical examples are given to reveal the effects of the boundary conditions,stacking sequence,characteristic scale,and phason fluctuation characteristics on the dispersion curves of Love waves propagating in PQC nanoplates with surface effects. 展开更多
关键词 piezoelectric quasicrystal(pqc)material multilayered plate dispersion characteristic surface effect
下载PDF
Formulating and Supporting a Hypothesis to Address a Catch-22 Situation in 6G Communication Networks
13
作者 Fazal Raheman 《Journal of Information Security》 2024年第3期340-354,共15页
2030 is projected as the year for the launch of the 6G (sixth generation) telecommunication technology. It is also the year predicted to introduce quantum computers powerful enough to break current cryptography algori... 2030 is projected as the year for the launch of the 6G (sixth generation) telecommunication technology. It is also the year predicted to introduce quantum computers powerful enough to break current cryptography algorithms. Cryptography remains the mainstay of securing the Internet and the 6G networks. Post quantum cryptography (PQC) algorithms are currently under development and standardization by the NIST (National Institute of Standards and Technology) and other regulatory agencies. PQC deployment will make the 6G goals of very low latency and low cost almost unachievable, as most PQC algorithms rely on keys much larger than those in classical RSA (Rivest, Shamir, and Adleman) algorithms. The large PQC keys consume more storage space and processing power, increasing the latency and costs of their implementation. Thus, PQC deployment may compromise the latency and pricing goals of 6G networks. Moreover, all the PQC candidates under NIST evaluation have so far failed, seriously jeopardizing their standardization and placing the security of 6G against the Q-Day threat in a catch-22 situation. This report formulates a research question and builds and supports a research hypothesis to explore an alternate absolute zero trust (AZT) security strategy for securing 6G networks. AZT is autonomous, fast, and low-cost. 展开更多
关键词 6G Quantum Computing pqc LATENCY Cost
下载PDF
量子计算信息安全威胁与应对策略分析
14
作者 赖俊森 赵文玉 张海懿 《信息通信技术与政策》 2024年第7期24-29,共6页
量子计算在理论上已被证明具有远超现有经典计算的公钥密码破解能力。近年来量子计算发展迅速,引发公钥密码破解的信息安全威胁日益迫近,应对量子计算信息安全威胁已成为全球信息安全管理机构和信息通信等行业的关注热点。分析量子计算... 量子计算在理论上已被证明具有远超现有经典计算的公钥密码破解能力。近年来量子计算发展迅速,引发公钥密码破解的信息安全威胁日益迫近,应对量子计算信息安全威胁已成为全球信息安全管理机构和信息通信等行业的关注热点。分析量子计算信息安全威胁及影响,探讨抗量子密码和量子密钥分发两种主要应对策略的技术优劣势和应用发展趋势,提出应对量子计算信息安全威胁的发展建议。 展开更多
关键词 量子计算 信息安全 抗量子密码 量子密钥分发
下载PDF
Defining Quantum Advantage for Building a Sustainable MVP to Deliver Quantum Computing Services
15
作者 Fazal Raheman 《Open Journal of Applied Sciences》 2024年第6期1530-1549,共20页
Quantum Computing (QC) is hailed as the future of computers. After Google’s claim of achieving Quantum Supremacy in 2019, several groups challenged the claim. Some QC experts attribute catastrophic risks that unrestr... Quantum Computing (QC) is hailed as the future of computers. After Google’s claim of achieving Quantum Supremacy in 2019, several groups challenged the claim. Some QC experts attribute catastrophic risks that unrestrained QC may cause in the future by collapsing the current cryptographic cybersecurity infrastructure. These predictions are relevant only if QC becomes commercially viable and sustainable in the future. No technology can be a one-way ticket to catastrophe, and neither can the definition of superiority of that technology be. If there are catastrophic risks, large-scale QC can never enter the public domain as a minimum viable product (MVP) unless there are safeguards in place. Those safeguards should obviously become an integral part of the definition of its superiority over the legacy systems. NIST (National Institute of Standards & Technology) is pursuing the standardization of Post Quantum Cryptography (PQC) as that safeguard. However, with all the 82 candidate PQCs failing and companies already offering QC as a service, there’s an urgent need for an alternate strategy to mitigate the impending Q-Day threat and render QC sustainable. Our research proposes a novel encryption-agnostic cybersecurity approach to safeguard QC. It articulates a comprehensive definition of an MVP that can potentially set a sustainable gold standard for defining commercially viable quantum advantage over classical computing. 展开更多
关键词 CYBERSECURITY NIST pqc Quantum Computers Quantum Advantage Quantum Supremacy
下载PDF
基于Polar码的ElGamal型公钥密码体制
16
作者 刘冰 吴旭聃 聂艇 《计算机应用研究》 CSCD 北大核心 2024年第1期254-259,271,共7页
在量子计算技术飞速发展的时代背景下,为了满足密码应用的安全需求,提出了一种基于Polar码的ElGamal型公钥密码体制。采用Polar码为基于纠错码ElGamal型公钥密码体制中的公开码,利用SC译码算法进行译码,并对方案的译码失败概率和安全性... 在量子计算技术飞速发展的时代背景下,为了满足密码应用的安全需求,提出了一种基于Polar码的ElGamal型公钥密码体制。采用Polar码为基于纠错码ElGamal型公钥密码体制中的公开码,利用SC译码算法进行译码,并对方案的译码失败概率和安全性进行了分析。结果表明算法具有较高的传信率,选取的参数满足信息集译码复杂度和译码失败概率的要求,且算法满足IND-CPA安全性。 展开更多
关键词 公钥密码 ElGamal型体制 Polar码 SC译码算法
下载PDF
PQC—100助留剂在麦草浆造纸中的应用研究
17
作者 安庆坤 崔芳兰 高威 《江苏造纸》 2003年第4期39-41,共3页
介绍PQC—100助留剂在麦草浆造纸中的应用,通过不同加入顺序及加入量对纸张的填料留着率、灰份及白水浓度、脱水速度、裂断长等指标的影响进行了较系统的实验,探索PQC—100在麦草浆造纸中应用的最佳工艺条件。
关键词 pqc—100助留剂 麦草浆 造纸 填料留着率 应用研究 灰份
下载PDF
SMG图像质量控制(PQC)体系建设的思考与实践
18
作者 霍秋林 顾婉卿 《影视制作》 2016年第12期17-21,共5页
SMG技术管理部自2015年起启动电视节目制作图像质量控制(Production Quality Control,简称PQC)机制建设,在既有技术质量管理体系的基础上,以视觉为切入,将主、客观评价体系有机结合,精益化分析各工种间的影响要素,逐步梳理工作界面,优... SMG技术管理部自2015年起启动电视节目制作图像质量控制(Production Quality Control,简称PQC)机制建设,在既有技术质量管理体系的基础上,以视觉为切入,将主、客观评价体系有机结合,精益化分析各工种间的影响要素,逐步梳理工作界面,优化机制和流程,以期实现对图像技术质量及视觉呈现效果整体化、系统化的集成管理。本文简要阐述了SMG-PQC机制建设的总体现状、规划思路与主要举措,并结合中超及国足赛事电视转播中应用的SMG足球转播PQC机制进行实例详解。 展开更多
关键词 图像质量控制(pqc) 管理架构 品控基准线 流程规范研究 工艺研究 评价体系构建 关键环节研究
下载PDF
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
19
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
下载PDF
A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network 被引量:1
20
作者 王兴元 鲍雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期232-240,共9页
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (... In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption. 展开更多
关键词 image encryption block cryptosystem chaotic neural network coupled map lattice
下载PDF
上一页 1 2 76 下一页 到第
使用帮助 返回顶部