×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [7]
华南理工大学 [4]
北京大学 [2]
数学与系统科学研究院 [2]
山东大学 [2]
软件研究所 [1]
更多...
内容类型
期刊论文 [13]
会议论文 [5]
发表日期
2021 [1]
2020 [1]
2018 [3]
2017 [2]
2016 [3]
2015 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共18条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 18
作者:
Li, Haoyu
;
Liu, Renzhang
;
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:57/0
  |  
提交时间:2021/06/01
Ciphertext-only attack
Compact-LWE
NIST
post-quantum cryptography
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
Structural Key Recovery of Simple Matrix Encryption Scheme Family
期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 12
作者:
Liu, Jinhui
;
Yu, Yong
;
Yang, Bo
;
Jia, Jianwei
;
Wang, Shijia
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
post-quantum cryptography
multivariate public-key cryptosystem
linearization equations attack
linear equations solving
computational complexity
Cryptanalysis of a Cryptosystem with Non-Commutative Platform Groups
期刊论文
CHINA COMMUNICATIONS, 2018, 卷号: 15, 期号: 2
作者:
Liu, Jinhui
;
Jia, Jianwei
;
Zhang, Huanguo
;
Yu, Rongwei
;
Yu, Yong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
cryptanalysis
post-quantum computational
cryptography
conjugator search problem
computational complexity
A New Post-Quantum Blind Signature From Lattice Assumptions
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 27251-27258
作者:
Zhang, Pingyuan
;
Jiang, Han
;
Zheng, Zhihua
;
Hu, Peichu
;
Xu, Qiuliang
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/12/11
Post-quantum cryptography
blind signatures
lattices
provable
security
digital cash system
Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction
期刊论文
QUANTUM INFORMATION PROCESSING, 2017
Zhao, Yijia
;
Zhang, Yichen
;
Li, Zhengyu
;
Yu, Song
;
Guo, Hong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Continuous-variable quantum key distribution
Two-way protocol
Virtual photon subtraction
Tolerable excess noise
ENTANGLEMENT
CRYPTOGRAPHY
INFORMATION
STATES
Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2017, 卷号: 26, 期号: 6
作者:
Liu Jinhui
;
Zhang Huanguo
;
Jia Jianwei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Cryptography
Post-quantum computational cryptography
Cryptanalysis
Polynomial symmetrical decomposition (PSD) problem
Computational complexity
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2016, 卷号: 59, 期号: 5
作者:
Liu, Jinhui
;
Zhang, Huanguo
;
Jia, Jianwei
;
Wang, Houzhen
;
Mao, Shaowu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
cryptography
post-quantum computational cryptography
asymmetric cipher protocol
cryptanalysis
matrix decomposition
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 卷号: 21, 期号: 3
作者:
Liu, Jinhui
;
Fan, Aiwan
;
Jia, Jianwei
;
Zhang, Huanguo
;
Wang, Houzhen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
cryptography
post-quantum cryptography
public key encryption
cryptanalysis
linear equations
Cryptanalysis of Cryptosystems Based on General Linear Group
期刊论文
CHINA COMMUNICATIONS, 2016, 卷号: 13, 期号: 6
作者:
Zhang, Huanguo
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
cryptography
post quantum computational cryptography
cryptanalysis
non-abelian algebraic structures
linear equations
©版权所有 ©2017 CSpace - Powered by
CSpace