全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Huaqun Wang , Debiao He , Yimu Ji
来源:[J].Future Generation Computer Systems(IF 1.864), 2020, Vol.107, pp.854-862
摘要:... Since bitcoin exchange’s signature takes use of the elliptic curve cryptography, we design the first concrete DV-PoA scheme by using elliptic curve cryptography in order to be consistent with it. Then, we prove the security of the proposed DV-PoA scheme. After that, we ...
作者:Guozhen Xiao , Mingxin Lu , Lei Qin ...
来源:[J].Chinese Science Bulletin(IF 1.319), 2006, Vol.51 (12), pp.1413-1420Springer
摘要:Abstract(#br)DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary information density ...
作者:Youliang Tian , Qiuxian Li , Jia Hu ...
来源:[J].World Wide Web: Internet and Web Information Systems(IF 1.196), 2020, Vol.23 (2), pp.1423-1440Springer
摘要:... Public-key Cryptography is the main means to solve the security problems based on smart card password authentication and identity authentication protocol. This paper reviews the security issues of public key cryptography used in smart cards from the perspective of information...
作者:Fangli Yang , Daowen Qiu
来源:[J].Quantum Information Processing(IF 1.748), 2020, Vol.19 (4), pp.145-195Springer
摘要:Abstract(#br)We improve the thermal states quantum cryptography by inserting the linear optics cloning machine (LOCM) into Bob’s side. This approach can enhance the effectiveness of the practical quantum cryptography under noisy resources and channel in terms of secret key ra...
作者:Hasan Iqbal , Walter O. Krawec
来源:[J].Quantum Information Processing(IF 1.748), 2020, Vol.19 (7), pp.661-444Springer
摘要:... Research in the field of semi-quantum cryptography requires new insights into working with restricted protocols and, so, the tools and techniques derived in this field can translate to results in broader quantum information science. Furthermore, other questions such as the c...
作者:Jinjing Shi , Shuhui Chen , Yuhu Lu ...
来源:[J].Scientific Reports(IF 2.927), 2020, Vol.10 (1), pp.042311-363Springer
摘要:Abstract(#br)An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model is introduced for designing the quantum cryptography algorithm. It indicates an approach to design a quantum neural crypto...
作者:R. Vijay Sai , Har Narayan Upadhyay , M. Prabhu ...
来源:[J].Microprocessors and Microsystems(IF 0.549), 2019, Vol.71Elsevier
摘要:... Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficulties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low ...
作者:Xiangyu Chang , Aimin Yan , Hongbo Zhang
来源:[J].Optics and Lasers in Engineering(IF 1.916), 2020, Vol.126Elsevier
摘要:Abstract(#br)The optical scanning cryptography (OSC) is one of the most utilized optical encryption systems. Our research is inspired from the observation that there is a linear system property within the ciphertext expression equation of OSC. Given the linear system property, it...
作者:Feng Hu , Lucas Lamata , Mikel Sanz ...
来源:[J].Physics Letters A(IF 1.766), 2020, Vol.384 (10)Elsevier
摘要:Abstract(#br)As the building block in symmetric cryptography, designing Boolean functions satisfying multiple properties is an important problem in sequence ciphers, block ciphers, and hash functions. However, the search of n -variable Boolean functions fulfilling global cryptogr...
作者:Xiaotian Wu , Ching-Nung Yang
来源:[J].Journal of Visual Communication and Image Representation(IF 1.195), 2020Elsevier
摘要:Abstract(#br)Color-black-and-white visual cryptography scheme (CBW-VCS) is a methodology that utilizes colors to alleviate the pixel expansion problem. In a general ( k , n ) CBW-VCS, when k and n become larger, the pixel expansion increases dramatically. In this paper, two const...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×